• Title/Summary/Keyword: Review spam

Search Result 13, Processing Time 0.034 seconds

Factors Affecting the Intention to Invade Privacy on Social Network Service (SNS에서 프라이버시 침해의도에 영향을 미치는 요인)

  • Ahn, Soomi;Jang, Jaeyoung;Kim, Jidong;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.16 no.2
    • /
    • pp.1-23
    • /
    • 2014
  • With side effects such as Phishing and Spam using personal information in Social Network Service, there is a growing need for studies related to harmful behaviors such as the reason for privacy violation. As such, this study assumed privacy violation to be ethical decision, making behavior and used the Theory of Planned Behavior and Motivation Theory, which are mostly used in social science to identify the factors affecting privacy violation. The results suggested that the Perceived Enjoyment and Punishment used in motivation studies affected privacy violation behaviors, and that the factors of the Theory of Planned Behavior such as Attitude toward Privacy Violation, Subjective Norms of Privacy Violation, and Perceived Behavioral Control with regard to Privacy Violation significantly influenced the Intention to Privacy Violation. On the other hand, Perceived Curiosity and Subjective Norms of Privacy Violation did not affect the Intention to Privacy Violation. Therefore, this study confirmed that the Theory of Planned Behavior was appropriate to explain the Intention to Privacy Violation, and that the variables of the Motivation Theory generally influenced the Attitude toward Privacy Violation. This study was significant since it extended the scope of theoretical privacy study from users and victims centered to inflictor and applied the Extended Theory of Planned Behavior using the variables of the Motivation Theory in the study of Intention to Privacy Violation. From the practical aspect, it provided the ground for privacy education based on the fact that the Attitude toward Privacy Violation can be curbed when education on the Privacy Concerns, Perceived Enjoyment, and Punishment with regard to privacy is strengthened. It also cited the need for the punishment of privacy violation and the practical ground to amend the terms and conditions of user license and Personal Information Protection Act to provide policy support.

An Empirical Study on the Effects of e-Mail Marketing : A focus on e-Mail Campaign for Credit Card Consumers (이메일 마케팅 성과에 관한 연구: 신용카드 고객을 대상으로 한 캠페인을 중심으로)

  • Shin, Sung-Hoon;Chung, Soo-Yeon;Park, Cheol
    • Information Systems Review
    • /
    • v.11 no.1
    • /
    • pp.49-67
    • /
    • 2009
  • E-mail marketing is the cheapest channel in target marketing. The channel works amazingly well for marketers who know how to use it. The e-mail marketers are able to integrate transactional and behavioral data to improve the targeting content of e-mail marketing campaigns. The cost in e-mail marketing is low and e-mail marketing makes no pollution. But, the e-mail response rate is lower than all the other channels. So, it is very hard for companies to increase their sales volumes, though the companies are ready to execute e-mail marketing campaigns on the side of computer systems. Marketers can send messages easily to target customers compared to other channels. But, the possibility to be read by the customers is low. Normal e-mails are continually devalued by spam mails. This study shows the influence of e-mail marketing to increase sales used by credit cards, on the basis of the real data promoted by A bank, in the Republic of Korea. The analysis on the traits of the respondent can help marketers to target customers. If additional studies on the response prediction model on the basis of traits of potential respondents are done, the targeting method to increase the effectiveness of e-mail marketing will be better structured and organized.

The Effect of Message Completeness and Leakage Cues on the Credibility of Mobile Promotion Messages (기업의 스마트폰 메시지에 대한 고객 신뢰도에 관한 연구: 메시지 정교화 모델을 중심으로)

  • Hyun Jun Jeon;Jin Seon Choe;Jai-Yeol Son
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.61-80
    • /
    • 2018
  • Individuals often receive smishing campaigns (mobile phishing messages), which they treat as spam. Thus, firms should understand how their customers distinguish their promotion messages from smishing. However, only a few studies examined this important issue. The present study employs the elaboration likelihood model to develop research hypotheses on the relationship between message cue and message credibility. The message cue in this study is classified as content cue, which is found in the content of promotion messages, and as leakage cue, which is found in peripheral information in the message. Leakage cue includes orthography (inclusion of special characters)and an abbreviated link sent by a faithless sender. We also propose that contextualization has a moderating effect on the relationship between content cue and credibility. We conducted a survey experiment to examine the effect of message cues on message credibility in the context of respondents receiving discount coupons through mobile messages. The result of data analysis based on 166 responses suggests that leakage cue had a negative effect on message credibility. A message with defective content cue has a marginally negative effect on message credibility. In particular, defective content cue in a high-contextual message has a strong negative impact on message credibility. This effect was not observed in low-contextual messages. Moreover, message credibility is significantly low regardless of the degree of contextualization if there is a leakage cue in the message. Our findings suggest that mobile promotion messages should be customized for message receivers and should have no leakage cues.