• Title/Summary/Keyword: Online Review

Search Result 1,163, Processing Time 0.02 seconds

Importance and requirements for dental prosthesis order platform services: a survey of dental professionals (치과 보철물 거래 플랫폼 서비스의 중요성과 요구사항: 치과 전문가 설문조사)

  • Gyu-Ri Kim;Keunbada Son;Du-Hyeong Lee;So-Yeun Kim;Myoung-Uk Jin;Kyu-Bok Lee
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.39 no.3
    • /
    • pp.105-118
    • /
    • 2023
  • Purpose: This study aimed to gain better understanding of the importance of dental prosthesis order platform services and to identify the essential elements for their enhancement and wider adoption among dental professionals. Materials and Methods: A survey was conducted to assess the perspectives of dentists, dental technicians, dental hygienists, and dental industry professionals toward dental prosthesis ordering and associated platform services (a total of 53 respondents). The questionnaire was devised after an expert review and assessed for reliability using Cronbach's alpha coefficient. Factor analysis revealed that 57 factors across five categories accounted for 88.417% of the total variance. The survey was administered through an online questionnaire platform, and data analysis was conducted using a statistical software, employing one-way analysis of variance and Tukey's honestly significant difference test (α = 0.05). Results: The essential elements identified were accurate information input, effective communication, delivery of distortion-free impressions, convenience in data transmission and storage, development of stable and affordable platform services (P < 0.05). Furthermore, significant differences were observed in the importance of these items based on age, dental profession, and career experience (P < 0.05). Conclusion: The dental prosthesis ordering platform services, the requirements of dental personnel were stability, economic efficiency, and ease of transmitting and storing prosthesis data. The findings can serve as important indicators for the development and improvement of dental prosthesis order platform services.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

Privacy Intrusion Intention on SNS: From Perspective of Intruders (SNS상에서 프라이버시 침해의도: 가해자 관점으로)

  • Eden Lee;Sanghui Kim;DongBack Seo
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.17-39
    • /
    • 2018
  • SNS enables people to easily connect and communicate with each other. People share information, including personal information, through SNS. Users are concerned about their privacies, but they unconsciously or consciously disclose their personal information on SNS to interact with others. The privacy of a self-disclosed person can be intruded by others. A person can write, fabricate, or distribute a story using the disclosed information of another even without obtaining consent from the information owner. Many studies focused on privacy intrusion, especially from the perspective of a victim. However, only a few studies examined privacy intrusion from the perspective of an intruder on SNS. This study focuses on the intention of privacy intrusion from the perspective of an intruder on SNS and the factors that affect intention. Privacy intrusion intentions are categorized into two types. The first type is intrusion of privacy by writing one's personal information without obtaining consent from the information owner;, whereas the other type pertains to intrusion of privacy by distributing one's personal information without obtaining consent from the information owner. A research model is developed based on motivation theory to identify how these factors affect these two types of privacy intrusion intentions on SNS. From the perspective of motivation theory, we draw one extrinsic motivational factor (response cost) and four intrinsic motivational factors, namely, perceived enjoyment, experience of being intruded on privacy, experience of invading someone's privacy, and punishment behavior. After analyzing 202survey data, we conclude that different factors affect these two types of privacy intrusion intention. However, no relationship was found between the two types of privacy intrusion intentions. One of the most interesting findings is that the experience of privacy intrusion is the most significant factor related to the two types of privacy intrusion intentions. The findings contribute to the literature on privacy by suggesting two types of privacy intrusion intentions on SNS and identifying their antecedents from the perspective of an intruder. Practitioners can also use the findings to develop SNS applications that can improve protection of user privacies and legitimize proper regulations relevant to online privacy.