• Title/Summary/Keyword: Social Control Theory

Search Result 289, Processing Time 0.025 seconds

An Empirical Test of Social Learning Theory and Complementary Approach in Explanation of University Students' Crimes in Social Network Services (SNS상의 범죄행위 설명에 있어 사회학습이론과 보완적 논의의 검증)

  • Lee, Seong-Sik
    • Informatization Policy
    • /
    • v.22 no.4
    • /
    • pp.91-104
    • /
    • 2015
  • This study tests the effects of differential association, definitions, differential reinforcement and imitation from social learning theory in the explanation of university students' crimes in social network services. In addition, this study tests the interaction effects between social learning factors and other factors such as low self-control, subcultural environment, and crime opportunity for the integrated approach. Using data from 486 university students in Seoul, results show that both definition and imitation have significant influences on crimes, even though differential association and differential reinforcement factors have no significant influences on crimes in social network services. Results also reveal that there are significant interaction effects between definition and subcultural environment, which meana that definition has a strong effect on crimes in high subcultural environment. In addition, it is found that reinforcement has also a strong effect on crimes in high crime opportunity and that interaction effect between imitation and low self-control is significant, which means that imitation has a strong effect on crimes in low self-control students.

An Integrated Computer Security Model Based on the General Trust Theory (신뢰성이론을 바탕으로 한 통합 컴퓨터 보안 모형에 관한 연구)

  • Lee, Sang-Gun;Yoo, Sang-Jin
    • Asia pacific journal of information systems
    • /
    • v.12 no.1
    • /
    • pp.123-138
    • /
    • 2002
  • For the last two decades, there has been much research on computer abuse from the perspective of the general deterrence theory based on objectism, which covers security policy, security awareness programs, and physical security system. The traditional view offered by the general deterrence theory indicates that security policy, security awareness, and security system play a major role in preventing computer abuse. In spite of continuous organizational efforts and investments based on these systematic factors, the incidence of computer abuse in organizations is still rapidly increasing. This paper proposes another perspective-the social control theory based on subjectism-in preventing computer abuse. According to the social control theory, organizational trust, which comprises organizational attachment, commitment, involvement and norms, can prevent computer abuse by reducing insider's computer abuse. The aim of this article is to assess the role of organizational trust come from attachment, commitment, involvement, norms in preventing computer abuse. The results indicate that both organizational trust and deterrent factors are effective in preventing computer abuse.

Understanding and application of the social system based on the system thinking : Focus on the cooperation model using Cellular Automata (시스템적 사고에 기반한 사회 시스템의 이해와 응용 : Cellular Automata를 이용한 협력모형을 중심으로)

  • 고길곤
    • Korean System Dynamics Review
    • /
    • v.1 no.1
    • /
    • pp.133-157
    • /
    • 2000
  • This paper deals with the social system from the point of system thinking consisting the fundamental construct of system dynamics. The Bertalanffy's general system theory, having been criticized because of its ambiguity, and the complex science theory, emerging system theory, are integrated by using the system thinking which is characterized with three concepts, 'feedback thinking', 'dynamic thinking', 'operational thinking'. In the integration, system thinking suggests the dynamic pattern of the social system have not only an equilibrium status but also complex status. The science of complexity gives an implication to system dynamics the important of the uncertainty and complexity if we interpret the social system as an open system. To show more concrete description, I simulate the cooperation model based on the iterated prisoner dilemma. The simulation results show the diverse patterns of cooperation and betrayal. Especially the sensitivity of initial payoff will cause the chaotic strategic landscapes as the game gose on. These results mean that we should not give the hasty prescription to control social system artificially. Because social system retains the self-organizing force in itself.

  • PDF

Effects of Application of Social Marketing Theory and the Health Belief Model in Promoting Cervical Cancer Screening among Targeted Women in Sisaket Province, Thailand

  • Wichachai, Suparp;Songserm, Nopparat;Akakul, Theerawut;Kuasiri, Chanapong
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.7
    • /
    • pp.3505-3510
    • /
    • 2016
  • Cervical cancer is a major public health problem in Thailand, being ranked second only to breast cancer. Thai women have been reported to have a low rate of cervical cancer screening (27.7% of the 80% goal of WHO). We therefore aimed to apply the social marketing theory and health belief model in promoting cervical cancer screening in Kanthararom District, Sisaket Province. A total of 92 from 974 targeted women aged 30-60 years were randomly divided into two groups. The experimental group underwent application of social marketing theory and a health belief model program promoting cervical cancer screening while the control group received normal services. Two research tools were used: (1) application of social marketing theory and health belief model program and (2) questionnaire used to evaluate perceptions of cervical cancer. Descriptive and inferential statistics including paired sample t-test and independent t-test were used to analyze the data. After the program had been used, the mean score of perception of cervical cancer of experimental group was at a higher level (${\bar{x}}=4.09$; S.D.=0.30), than in the control group (${\bar{x}}=3.82$; S.D.=0.20) with statistical significance (p<0.001). This research demonstrated an appropriate communication process in behavioral modification to prevent cervical cancer. It can be recommended that this program featuring social marketing and the health belief model be used to promote cervical cancer screening in targeted women and it can be promoted as a guideline for other health services, especially in health promotion and disease prevention.

An Empirical Study on Behavior and Psychology Concerning Invoice Disposal in the Context of Courier Services: A Comparative Study on Korea and the U.S.

  • Se Hun Lim
    • Asia pacific journal of information systems
    • /
    • v.28 no.2
    • /
    • pp.133-153
    • /
    • 2018
  • This study investigates responses to privacy concerns by analyzing the psychological and behavioral characteristics related to the disposition toward invoices of courier service users. To this end, we develop a theoretical framework by combining stimulus response theory, communication privacy management theory, the theory of reasoned action, and the theory of planned behavior. Based on the theoretical framework, we analyze the relationships between social influence, privacy propensity, privacy control, privacy risk, privacy concern, invoice disposition intention, and invoice disposition behavior in the context of courier services. To test our hypotheses, we survey courier service users in the U.S. and Korea. Using a structural equation model, we test the relationships among these various factors for the courier service users of the two countries. Results have distinct implications for the psychological and behavioral characteristics concerning the disposal of courier invoices and enable understanding of the characteristics of courier service customers of the two countries.

Gender Differences in Problematic Online Behavior of Adolescent Users over Time (남녀 청소년 소비자의 온라인 문제행동 차이에 대한 종단 분석)

  • Kim, Jung Eun
    • Human Ecology Research
    • /
    • v.53 no.6
    • /
    • pp.641-654
    • /
    • 2015
  • This study identifies and tracks changes gender differences in adolescent users' problematic online behavior. This study used Korea Youth Panel Survey (KYPS), which has tracked respondents over 7 years, with self-control theory and social learning theory applied as a theoretical framework. The model included individual-level variables such as self-control and respondent's experience of problematic behavior (offline), as well as socialization variables such as the number close friends who engaged in problematic offline behavior, parent-child relationships, and parental monitoring. Dependent variables included problematic online behavior, unauthorized ID use (ID theft) and cyberbullying (cursing/insulting someone in a chat room or on a bulletin board). Control variables consisted of academic performance, time spent on a computer, monthly household income, and father's educational attainment. Random and fixed effects models were performed by gender. Results supported self-control theory even for the within-level analysis (fixed effects models) regardless of gender, while social learning theory was partially supported. Only peer effects were found significant (except for unauthorized ID use) among girls. Year dummy variables showed significant negative associations; however, academic performance and time spent using computers were significant in some models. Father's educational attainment and monthly household income were found insignificant, even in the random effects models. We also discuss implications and suggestions for future research and policy makers.

A Reflection on Social Perspective of Information Behavior: Around the Theory of Information Worlds (사회적 관점에서의 정보행동 연구에 관한 일 고찰 - 정보세계이론을 중심으로 -)

  • Park, Sungjae
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.1
    • /
    • pp.425-447
    • /
    • 2022
  • The purpose of this study is to introduce the Theory of Information Worlds which analyzes information behaviors in the social perspective. This study analyzed dissertations using the theory to provide the understanding of the theory and suggest theoretical implications. The theory was developed by Burnett and Jeager in 2008, and since then it was applied in 14 dissertations. Key concepts of the theory include social norms, social types, information value, information behavior, and boundaries. These concepts are intervened in the process of creation and control of behavior through interaction each other. Qualitative research was adopted in more research rather than quantitative research; especially interview and content analysis were applied. It is expected that the spectrum of information behavior research in Korea is broaden and deeper through this study.

Application and the Effect of Nutrition Education Program Based on the Social Cognitive Theory Among Middle School Girls (일부 여자 중학생 대상 사회인지이론기반 영양교육 프로그램의 적용 및 효과)

  • Kim, Jihea;Woo, Taejung;Lee, Kyoung Ae;Lee, Seung Min;Lee, Kyung-Hea
    • Korean Journal of Community Nutrition
    • /
    • v.21 no.6
    • /
    • pp.497-508
    • /
    • 2016
  • Objectives: The purpose of this study was to evaluate the effect of nutrition education using materials based on social cognitive theory. Education topics focused on improving health-related and dietary self-awareness and behavior capability in adolescents. Methods: Participants were recruited from a middle school for girls; 67 students (educated group, n=34 and control group, n=33) participated. The education group received 12 lessons in club activity class. Self-administered surveys were conducted for each group before and after the nutrition education program. The questionnaires consisted of variables such as self-efficacy, outcome expectation, outcome expectancy, knowledge, and dietary practices based on the social cognitive theory. Education satisfaction was evaluated using a five-point Likert scale for two sections: a) teaching and learning and b) education results. The data were analyzed using a t-test and Chi Square-test (significance level: p < 0.05). Results: In the education group, post-education, there were significant differences in self-efficacy (p < 0.05), knowledge (p < 0.01), and dietary practices (p < 0.05), whereas outcome expectation and expectancy did not show any significant differences. None of the variables showed any significant differences in the control group. Educational satisfaction scores were $4.38{\pm}0.12$ (teaching and learning) and $4.14{\pm}0.15$ (education results). Conclusions: This study showed that improving adolescent's awareness and behavior capability has a positive effect on their dietary practices. Moreover, this study suggested that a theory-based determinant should be considered to improve dietary behavior among adolescents.

Collision between Technology and Politics in Korea's Nuclear Policy (한국의 원자력정책을 둘러싼 기술과 정치의 충돌)

  • Hong Jung-Jin;Won Byung-Chul
    • Journal of Science and Technology Studies
    • /
    • v.2 no.1 s.3
    • /
    • pp.135-156
    • /
    • 2002
  • The view of technology is largely divided into 2 theories: (1) the theory of autonomous technology that claims technology's own development logic and momentum, (2) the theory of social determinism that regards technology as reflection of political choices. Autonomous technologists read our society in the language of technology and social determinists read our technology in the language of society. This paper tries to analyze that conflicts between government and environmental group in nuclear policy, especially radioactive waste disposition policy reflect collisions between autonomous technologists and social determinists representing technology and politics, respectively. On the surface, such collisions are occurred in rational, ethical and economical aspects. It maintains, however, in depth, they are about solution means to problems from which technologies derived. Also, it suggests that one of the alternatives to avoid inevitable collision may be interaction approach based on intertwining technology with society. More understanding of political natures and control possibilities for technology is needed because interaction approach is founded on this understanding. Finally, to help forming the Korea's nuclear utilization policy from now on, it gives 2 case studies compared France with Germany where expanding and contracting nuclear utilization policy, respectively.

  • PDF

Effects of Self-efficacy and Self-control on Internet Addiction in Middle School Students: A Social Cognitive Theory-Driven Focus on the Mediating Influence of Social Support

  • Yang, Sun-Yi
    • Child Health Nursing Research
    • /
    • v.26 no.3
    • /
    • pp.357-365
    • /
    • 2020
  • Purpose: The aim of this study was to investigate internet addiction among middle school students and to examine the mediating effects of social support in the relationships of self-efficacy and self-control with internet addiction. Methods: The participants in the study were 119 middle school students in J city. The measurements included a self-efficacy scale, a self-control scale, a social support scale, and the Internet Addiction Scale for Youth. Data were analyzed using the independent t-test or Mann-Whitney U test, one-way analysis of variance, the Scheffé test, Pearson correlation coefficients, and multiple-regression using SPSS version 22.0. Mediation effects were analyzed by the Sobel test and Baron and Kenny's hierarchical analysis technique. Results: Significant correlations were found among self-efficacy, self-control, and internet addiction. Social support had partial mediating effects in the relationship between self-efficacy and internet addiction, as well as in the relationship between self-control and internet addition. Conclusion: In order to prevent internet addiction, the promotion of interactions among peers, which is a component of social support, is particularly important. It is also necessary to promote face-to-face activities that can strengthen relationships. The findings suggest that intensifying social support may help reduce the level of internet addiction in middle school students.