• Title/Summary/Keyword: Internet self-efficacy

Search Result 170, Processing Time 0.03 seconds

A study on security independent behavior in social game using expanded health belief model (건강신념모델을 확장한 소셜게임(Social Game) 보안의지행동에 관한 연구)

  • Ahn, Ho-Jeong;Kim, Sung-Jun;Kwon, Do-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.99-118
    • /
    • 2016
  • With the development of Internet and popularization of smartphones over recent years, social network services are experiencing rapid growth. On top of this, smartphone gaming market is showing a rapid growth and the use of mobile social games is on the significant rise. The occurrence of game data manipulation targeting these services and personal information leakage is highlighting the importance of social gaming security. This study is intended to propose development plans effective and efficient in social game services by figuring out factors putting effects on security dependent behavior of social game users in Korea and carrying out a practical study on the casual relationship between factors influencing security dependent behavior through recognized behavioral control and attitudes for privacy infringement of these factors. To do this, proposed was a study model in which the HBM(Health Belief Model) allowing the social game user to influence security dependent behavior was expanded and applied as a major variable. To verify the study model of this study practically, a survey was conducted among university students in Seoul-based K University and S University who had experienced using social game services. According to the study findings, firstly, the perceived seriousness turned out to provide positive influence to trust. But, the perceived seriousness turned out not to put positive effects on self-efficacy. Secondly, the perceived probability turned out not to put positive effects on self-efficacy and trust. Thirdly, the perceived gain turned out to put positive effects on self-efficacy and trust. Fourthly, the perceived disorder turned out not to put positive effects on self-efficacy and trust. Fifthly, self-efficacy turned out to put positive effects on trust. But, self-efficacy turned out not to put positive effects on security dependent behavior. Sixthly, trust turned out not to put positive effects on security dependent behavior. This study is intended to make a strategic proposal so that social game users can raise awareness of their level of security perception and security willingness through this.

  • PDF

A Study on the Determinants of Intention to Use Mobile Banking (모바일뱅킹 사용의도의 영향요인에 관한 연구)

  • Moon, Yong-Eun;Jung, Eau-Jin
    • The Journal of Information Systems
    • /
    • v.13 no.2
    • /
    • pp.89-117
    • /
    • 2004
  • Mobile technologies and services have become one of the inevitable parts of people's lives and mobile businesses have also been widespread. Popular mobile internet services through cell phones have made people in the financial industry consider that 'mobile' is promising. Nevertheless, there have been little studies of mobile services in the financial industry and most of the studies have been concentrated on internet services. The main purpose of this study is to investigate on the determinants of intention to use mobile banking. To achieve the goal, based on the theoretical backgrounds of the Technology Acceptance Model(TAM). Survey questionnaires were distributed via post & email to 500 users who have been experiences with cell phone and have an account. Out of 291 responded questionnaires, 275 data sets were available for statistical analysis with SPSS 10.1. Research hypotheses are analyzed by LISREL 8.30. Factor analysis identified seven external factors : (1) convenience, (2) cost, (3) unusefulness, (4) riskiness, (5) personal innovativeness (6) users' self-efficacy (7) experience of mobile services. Results of this study show that convenience, unusefulness, riskiness, personal innovativeness and experience of mobile services have significant effects on intention to use mobile banking . Much of the previous researches have dealt with service provider only and have focused on mobile internet. In this regard, when it comes to a viewpoint that regards the mobile banking sector as a new sector of mobile businesses. This study may provide a guideline to activate of mobile banking acceptance.

  • PDF

A Study of the Impacting Factors on Sharing Illegal Digital Contents and Copyright Cognition (불법 디지털콘텐츠 공유의도에 영향을 미치는 요인과 저작권인식에 관한 연구)

  • Shen, Hong Yan;Lim, Gyoo Gun
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.2
    • /
    • pp.23-40
    • /
    • 2018
  • In order to reduce the spread of illegal digital contents, many studies have been focusing on how to stop it through laws and regulations. Only few of the studies tried to explain the illegal behaviors from individual's viewpoints. This paper aims to examine the intention of sharing illegal digital contents over the Internet and proposes a theoretical model based on the Theory of Planned Behavior (TPB) along with the introduction of two outcome expectations. We also argue that the individuals' cognition of online copyright will influence individuals' illegal contents sharing on the Internet. We have collected data from online survey and offline interview. By empirical study, the results support the theoretical model except the subjective norm which has no effect on individuals' behavior. This is a different finding from the previous researches revealing that the subjective norm has no effect on individuals' unethical actions. Overall, the findings provide strong confirmation that attitude, self-efficacy and outcome expectations impact on individual's intention of sharing illegal contents. In addition, this study proposed an improved cognition of online copyright through education and standard of new media management will reduce illegal contents sharing on Internet.

Psychological phenomenon analysis of short video users' anxiety, Addiction and Subjective well-being

  • Peng, Chen;Lee, Jong-Yoon;Liu, ShanShan
    • International Journal of Contents
    • /
    • v.18 no.1
    • /
    • pp.27-39
    • /
    • 2022
  • Short videos are becoming more popular in mobile Internet age. Not only people's media consumption patterns have been changed by the rise of this new media form, but also it has posed challenges to public psychological well-being. For many netizens, their entertainment needs have been met by watching short videos. However, many side effects, such as addiction and anxiety, reduce users' subjective well-being instead of satisfying the entertainment motivation after watching short videos. Therefore, it has become a significant research problem in short videos to figure out how to get audiences to watch short videos on a regular basis while avoiding side effects like anxiety and addiction and improving audiences' subjective well-being. Based on the theory of Internet addiction, this study analyzed short video users using the 2×2×2 research method and explored the relationship between the length of use, addiction, anxiety, and subjective well-being of short video users. The results showed that short video users with different usage lengths showed significant differences in addiction, anxiety, subjective well-being, and online social support; innovative different short video users showed significant differences in addiction and anxiety, as well as a triadic relational interaction of short video users' anxiety under the interaction with self-efficacy and online social support. This study contributes to the advancement of internet addiction theory research and application, assisting short video users in avoiding addiction and anxiety, and improving the subjective well-being of short video users, thereby promoting the growth of the short video industry.

A Study on the Influence of the Perception of Personal Information Security of Youth on Security Attitude and Security Behavior (청소년의 개인정보보안 인식이 보안의도와 보안행동에 미치는 영향에 관한 연구)

  • Park, KyungA
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.4
    • /
    • pp.79-98
    • /
    • 2019
  • In this paper, the security behaviors and attitudes related with the personal information of teenagers were investigated using empirical data based on rational behavior theory and protection motivation theory. An experiment for teenagers was conducted on Excel and the statistical packages (i.e., SPSS 21.0 and SmartPLS2.0.M3) to see how self-efficiency, security attitude, security intention and individual innovation affect their security behaviors. The experimental results showed that the security behaviors and attitudes of teenagers between internet and information devices are closely related, and the social influences can affect personal self-efficacy and security attitudes. Finally, we can know that teenagers should recognize the importance of security and protect their personal information safely through continuous education and training so that they can be linked to security behaviors.

The effect of reading strategies developing through reciprocal teaching on reading comprehension, metacognition, self efficacy (상보적 수업을 활용한 읽기전략 훈련이 독해력, 초인지, 자기효능감에 미치는 효과)

  • Kim, Mi-Jeong;Eun, Hyuk-Gi
    • The Korean Journal of Elementary Counseling
    • /
    • v.11 no.2
    • /
    • pp.299-320
    • /
    • 2012
  • We have information through a variety of media such as language, pictures and internet. Since we get information through texts mostly, we can say that reading ability which enables a person to read a text and understand its meaning basically is the most essential for people to possess. Taking the advantage of the fact that a school is a place where learning and daily-life guidance can be made at the same time, we need to try encouraging students to involve in learning process and feel a sense of accomplishment by adding consultation between a teacher and a student or between a student and a student in Korean subject. This study selected two fifth grade classes of an elementary school of small and medium-sized city as an experimental group and a control group respectively and applied reading strategy program by using interaction of complementary lesson as the number of ten times during five weeks. It focused on making students interested in complementary class and encouraging them to become active participants. This study's goal is to see if the reading strategy program affects students' reading comprehension, metacognition and a sense of self-efficacy The results of the study are as in the following: first, the reading strategy program of complementary lesson is effective in students' reading comprehension and a range of factual understanding and sentimental understanding. Second, the reading strategy program of complementary lesson is effective in adjustment area as a subordinate factor of metacognition. Third, the reading strategy program of complementary lessonis effective in students' sense of self-efficacy. It is shown that experience of using new reading strategy and successful experience and help in peer-group members have a positive effects on a student's sense of self-efficacy. Forth, as the result of satisfaction evaluation over the program with the students' activity report and researchers' observation results, the study shows that the organization and operation of the program influences on students' effort and participation to reach the goal together positively. Through the results as above, we can say that the reading strategy program of complementary lesson have a positive effect on a student's reading comprehension, metacognition and a sense of self-efficacy.

  • PDF

Self-Change Detection Algorithms using the Artificial Immune System (인공 면역계를 이용한 자기변경 검사 알고리즘)

  • 선상준;심귀보
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.4
    • /
    • pp.320-324
    • /
    • 2001
  • According to the rapid growth of computer and internet recently, A hacking to steal infonnations and the computer vinls to destroy the data in computer are now prevailing in the whole world. A study of methods to protect the data of computer is in progress. One of the study is constmction of computer immune system using biological immune system tbat has ability of removal and protection from extemal invasion. In this paper, we make a change detection algorithm which is based on ability of distinction between self and nonself in T-cytotoxic cell that is one of biological immune cell. In algorithm, MHC receptors are composed of a part of self-file that is recognized as itself and those shall distinguish self-file from the changed file. As a result of applying this algorithm to the changed self-files, we prove the efficacy of detection of the self-files changed by computer virus and hacking.

  • PDF

Comparing the Effects of Two Methods of Education (Online versus Offline) and Gender on Information Security Behaviors

  • Minjung Park;Sangmi Chai
    • Asia pacific journal of information systems
    • /
    • v.30 no.2
    • /
    • pp.308-327
    • /
    • 2020
  • The importance of information security is increasing, and various efforts are being made to improve users' information security behaviors. Among these various efforts, information security education is mainly aimed at providing users with information security knowledge and improving information security awareness. This study classified the types of information security education into offline and online to examine the effects of each education method on attitudes toward information security (perceived severity, vulnerability, self-efficacy and response-efficacy) and information security behaviors. A survey was conducted for users with information security education experiences. The results obtained by comparing the differences in the path coefficients of personal information security behaviors according to information security education experiences showed that security behaviors were more significant in the online experience group than the offline group. In addition, gender differences were analyzed, and it was found that females had a greater impact on information security attitudes than males. This study also found that among Internet users with online information security education experience, females tend to have more information security behavior than males, but there were contrasting results among users with offline information security education experiences. The results of this study finally address the necessity of reflecting users' personalities in the systematic design of information security education in the future. Furthermore, the results of this study support the need for an appropriate education system that sufficiently understands education types to maximize the effects of information security education.

The Influence of Online Social Networking on Individual Virtual Competence and Task Performance in Organizations (온라인 네트워킹 활동이 가상협업 역량 및 업무성과에 미치는 영향)

  • Suh, A-Young;Shin, Kyung-Shik
    • Asia pacific journal of information systems
    • /
    • v.22 no.2
    • /
    • pp.39-69
    • /
    • 2012
  • With the advent of communication technologies including electronic collaborative tools and conferencing systems provided over the Internet, virtual collaboration is becoming increasingly common in organizations. Virtual collaboration refers to an environment in which the people working together are interdependent in their tasks, share responsibility for outcomes, are geographically dispersed, and rely on mediated rather than face-to face, communication to produce an outcome. Research suggests that new sets of individual skill, knowledge, and ability (SKAs) are required to perform effectively in today's virtualized workplace, which is labeled as individual virtual competence. It is also argued that use of online social networking sites may influence not only individuals' daily lives but also their capability to manage their work-related relationships in organizations, which in turn leads to better performance. The existing research regarding (1) the relationship between virtual competence and task performance and (2) the relationship between online networking and task performance has been conducted based on different theoretical perspectives so that little is known about how online social networking and virtual competence interplay to predict individuals' task performance. To fill this gap, this study raises the following research questions: (1) What is the individual virtual competence required for better adjustment to the virtual collaboration environment? (2) How does online networking via diverse social network service sites influence individuals' task performance in organizations? (3) How do the joint effects of individual virtual competence and online networking influence task performance? To address these research questions, we first draw on the prior literature and derive four dimensions of individual virtual competence that are related with an individual's self-concept, knowledge and ability. Computer self-efficacy is defined as the extent to which an individual beliefs in his or her ability to use computer technology broadly. Remotework self-efficacy is defined as the extent to which an individual beliefs in his or her ability to work and perform joint tasks with others in virtual settings. Virtual media skill is defined as the degree of confidence of individuals to function in their work role without face-to-face interactions. Virtual social skill is an individual's skill level in using technologies to communicate in virtual settings to their full potential. It should be noted that the concept of virtual social skill is different from the self-efficacy and captures an individual's cognition-based ability to build social relationships with others in virtual settings. Next, we discuss how online networking influences both individual virtual competence and task performance based on the social network theory and the social learning theory. We argue that online networking may enhance individuals' capability in expanding their social networks with low costs. We also argue that online networking may enable individuals to learn the necessary skills regarding how they use technological functions, communicate with others, and share information and make social relations using the technical functions provided by electronic media, consequently increasing individual virtual competence. To examine the relationships among online networking, virtual competence, and task performance, we developed research models (the mediation, interaction, and additive models, respectively) by integrating the social network theory and the social learning theory. Using data from 112 employees of a virtualized company, we tested the proposed research models. The results of analysis partly support the mediation model in that online social networking positively influences individuals' computer self-efficacy, virtual social skill, and virtual media skill, which are key predictors of individuals' task performance. Furthermore, the results of the analysis partly support the interaction model in that the level of remotework self-efficacy moderates the relationship between online social networking and task performance. The results paint a picture of people adjusting to virtual collaboration that constrains and enables their task performance. This study contributes to research and practice. First, we suggest a shift of research focus to the individual level when examining virtual phenomena and theorize that online social networking can enhance individual virtual competence in some aspects. Second, we replicate and advance the prior competence literature by linking each component of virtual competence and objective task performance. The results of this study provide useful insights into how human resource responsibilities assess employees' weakness and strength when they organize virtualized groups or projects. Furthermore, it provides managers with insights into the kinds of development or training programs that they can engage in with their employees to advance their ability to undertake virtual work.

  • PDF

Influence of Physical Therapist and Work Environment on Evidence-Based Practice in South Korea

  • Shin, Kyung-Mi;Song, Chang-Ho
    • Physical Therapy Rehabilitation Science
    • /
    • v.11 no.2
    • /
    • pp.224-234
    • /
    • 2022
  • Objective: The purpose of this study was to identify the practitioner and organizational characteristics that either detracted from or encouraged the use of evidence-based practice (EBP) by physical therapists. Design: A cross-sectional survey study Methods: Participants were 260 physical therapists currently practicing in South Korea. They completed a questionnaire designed to determine attitudes, beliefs, interest, self-efficacy and barriers to EBP, as well as demographic information about themselves and their practice settings. Logistic regression was used to examine relationships between socio-demographic and work environment characteristics and each practitioner factor. Results: Respondents agreed that the use of evidence in practice was necessary. Although 80% of them agreed that research findings are useful, 71% felt that a divide exists between research and practice. In terms of confidence in their skills, the ability to interpret results of statistical procedures ranked lowest. Despite internet access at work for 63% of respondents, only 14% were given protected work time to search and appraise the literature. Only 2% of respondents stated that their organization had a written requirement to use current evidence in their practice. The primary barrier to implementing EBP was a reported lack of time. Conclusions: In conclusion, most physical therapists stated they had a positive attitude toward EBP and were interested in learning or improving the skills necessary for implementation. Most recognized a need to increase the use of evidence in their daily practice, but a lack of ability to understand the results of research represents a significant barrier to implementing EBP.