• Title/Summary/Keyword: Theory of Information Services

Search Result 671, Processing Time 0.025 seconds

Algorithm for Efficient D-Class Computation (효율적인 D-클래스 계산을 위한 알고리즘)

  • Han, Jae-Il
    • Journal of Information Technology Services
    • /
    • v.6 no.1
    • /
    • pp.151-158
    • /
    • 2007
  • D-class computation requires multiplication of three Boolean matrices for each of all possible triples of $n{\times}n$ Boolean matrices and search for equivalent $n{\times}n$ Boolean matrices according to a specific equivalence relation. It is easy to see that even multiplying all $n{\times}n$ Boolean matrices with themselves shows exponential time complexity and D-Class computation was left an unsolved problem due to its computational complexity. The vector-based multiplication theory shows that the multiplication of three Boolean matrices for each of all possible triples of $n{\times}n$ Boolean matrices can be done much more efficiently. However, D-Class computation requires computation of equivalent classes in addition to the efficient multiplication. The paper discusses a theory and an algorithm for efficient D-class computation, and shows execution results of the algorithm.

Anonymous and Non-anonymous User Behavior on Social Media: A Case Study of Jodel and Instagram

  • Kasakowskij, Regina;Friedrich, Natalie;Fietkiewicz, Kaja J.;Stock, Wolfgang G.
    • Journal of Information Science Theory and Practice
    • /
    • v.6 no.3
    • /
    • pp.25-36
    • /
    • 2018
  • Anonymity plays an increasingly important role on social media. This is reflected by more and more applications enabling anonymous interactions. However, do social media users behave different when they are anonymous? In our research, we investigated social media services meant for solely anonymous use (Jodel) and for widely spread non-anonymous sharing of pictures and videos (Instagram). This study examines the impact of anonymity on the behavior of users on Jodel compared to their non-anonymous use of Instagram as well as the differences between the user types: producer, consumer, and participant. Our approach is based on the uses and gratifications theory (U>) by E. Katz, specifically on the sought gratifications (motivations) of self-presentation, information, socialization, and entertainment. Since Jodel is mostly used in Germany, we developed an online survey in German. The questions addressed the three different user types and were subdivided according to the four motivation categories of the U>. In total 664 test persons completed the questionnaire. The results show that anonymity indeed influences users' usage behavior depending on user types and different U> categories.

A Study on the Two Consecutive Multiplications of All $l{\times}n,\;n{\times}m\;and\;m{\times}k$ Boolean Matrices (모든 $l{\times}n,\;n{\times}m,\;m{\times}k$ 불리언 행렬 사이의 중첩곱셈에 대한 연구)

  • Han, Jae-Il
    • Journal of Information Technology Services
    • /
    • v.5 no.1
    • /
    • pp.191-198
    • /
    • 2006
  • Boolean matrices have been successfully used in various areas, and many researches have been performed on them. However, almost all the researches focus on the efficient multiplication of two boolean matrices and no research has been shown to deal with the multiplication of all boolean matrices and their consecutive multiplications. The paper suggests a mathematical theory that enables the efficient consecutive multiplications of all $l{\times}n,\;n{\times}m,\;and\;m{\times}k$ boolean matrices, and discusses its computational complexity and the execution results of the consecutive multiplication algorithm based on the theory.

Why SNS Sites Are Using Advertising Models Like You: An Explanation from Construal-Level Theory

  • Garam Hong;Seongwon Lee;Kil-Soo Suh
    • Asia pacific journal of information systems
    • /
    • v.30 no.4
    • /
    • pp.695-718
    • /
    • 2020
  • Based on the Construal Level Theory, we aim to study a most favorable fit among the advertising model, media type, and message construals, which are important factors in an advertisement. A two (social distance of the ad model in an ad: distal (low similarity) vs proximal (high similarity) by two (social distance of a media type: distal (portal) vs. proximal (SNS)) by two (message construal: abstract vs concrete) laboratory experiment was conducted to examine attitude changes on ad messages. The results show that abstract messages were more effective in attitude toward advertisement and purchase intention under the distal social distance (i.e. advertising model in low-similarity and portal media type) while concrete messages were so under the proximal social distance and SNS media type.

Analyzing Moderating Effects of WiBro User Experiences

  • Lee, Bong-Gyou;Kim, Ki-Youn;Song, Jae-Sung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.177-190
    • /
    • 2011
  • The purpose of this study is to explore the determinants of actual demand for wireless broadband (WiBro) services in Korea. To this end, this study identifies conceptual definitions of diverse latent variables and determines the significance of the causal relationship between independent and dependent variables. It then presents the nomadic user concept by testing the moderator effect. This study also proposes a revised Unified Theory of Acceptance and Use of Technology (UTAUT) model, which is an appropriate model for wireless communication services and users' attributes. Prior research has concentrated exclusively on the Technology Acceptance Model (TAM) based on future potential users. Compared to previous studies, the current research model and analysis results are useful in not only academic but also industry contexts.

Disaster Recovery Priority Decision of Total Information System for Port Logistics : Fuzzy TOPSIS Approach (항만물류종합정보시스템의 재난복구 우선순위결정 : 퍼지 TOPSIS 접근방법)

  • Kim, Ki-Yoon;Kim, Do-Hyeong
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.1-16
    • /
    • 2012
  • This paper is aimed to present a fuzzy decision-making approach to deal with disaster recovery priority decision problem in information system. We derive an evaluation approach based on TOPSIS(Technique for Order Performance by Similarity to Ideal Solution), to help disaster recovery priority decision of total information system for port logistics in a fuzzy environment where the vagueness and subjectivity are handled with linguistic terms parameterized by trapezoidal fuzzy numbers. This study applies the fuzzy multi-criteria decision-making method to determine the importance weight of evaluation criteria and to synthesize the ratings of candidate disaster recovery system. Aggregated the evaluators' attitude toward preference, then TOPSIS is employed to obtain a crisp overall performance value for each alternative to make a final decision. This approach is demonstrated with a real case study involving 4 evaluation criteria(system dependence, RTO, loss, alternative business support), 7 information systems for port logistics assessed by 5 evaluators from Maritime Affairs and Port Office.

Collaborative Consumption Motivation Factor Model under the Sharing Economy (공유경제 모형에서의 협력적 소비 영향요인)

  • Roh, Tae-Hyup;Choi, Hwa-Yeol
    • The Journal of Information Systems
    • /
    • v.27 no.2
    • /
    • pp.197-219
    • /
    • 2018
  • Purpose The purpose of this study is to examine what motivates users to adopt one of the emerging applications for collaborative consumption of sharing economy. Using the self-determination theory, motivation theory and TAM(Technology Acceptance Model) as the theoretical framework, this study illustrates important factors that influence adoption of collaborative consumption service. We develops the ICTs(Information and Communications Technologies) initiatives and motivation model to collaborative consumption. Design/methodology/approach This paper makes use of a quantitative methodology using survey questionnaire that allows for the measurement of the eight constructs(System Availability, Contents Quality, Design & Personalization, Security & Privacy, Emotional & Social Value, Economic Value, Attitude, Adoption & Consumption) contained in the hypothesized theoretical model on the basis of the prior literatures. Data collected from a sample of 227 respondents who have used the collaborative consumption services and provided the foundation for the examination of the proposed relationships in the model. Findings This study has the following implications for the users and providers of CC platforms and services. The ICTs initiatives (System Availability, Contents Quality, Design & Personalization, Security & Privacy) are the influential factors that motivate the emotional and social value to CC. On the other hand, The ICTs initiatives (System Availability, Contents Quality) are not very significant factors of economic value to CC. The empirical analysis result indicate that there are significant causal effect among emotional & social value, economic value, and adoption to CC. This study provides important theoretical implications for innovation adoption research through an empirical examination of the relationship between ICTs initiatives, motivation factors to collaborative consumption in the sharing economy.

An Empirical Study of B2C Logistics Services Users' Privacy Risk, Privacy Trust, Privacy Concern, and Willingness to Comply with Information Protection Policy: Cognitive Valence Theory Approach (B2C 물류서비스 이용자의 프라이버시 위험, 프라이버시 신뢰, 프라이버시 우려, 정보보호정책 준수의지에 대한 실증연구: 인지밸런스이론 접근)

  • Se Hun Lim;Dan J. Kim
    • Information Systems Review
    • /
    • v.22 no.2
    • /
    • pp.101-120
    • /
    • 2020
  • This study investigates the effects of privacy psychological characteristics of B2C logistics services users on their willingness to comply with their logistics companies' information protection policy. Using cognitive valence theory as a theoretical framework, this study proposes a research model to examine the relationships between users' logistics security knowledge, privacy trust, privacy risk, privacy concern, and their willingness of information protection policy compliance. To test the proposed model, we conducted a survey from actual users of logistics services and collected valid 151 samples. We analyzed the data using a structural equation modeling software. The empirical results show that logistics security knowledge positively affects privacy trust; privacy concern positively influences privacy risk; privacy trust, privacy risk, and privacy concern positively influence behavioral willingness of compliance. However, logistics security knowledge does not affect behavioral willingness of compliance. The results of the study provide several contributions to the literature of B2C logistics services domain and managerial implications to logistics services companies.

An Empirical Test of Social Learning Theory and Complementary Approach in Explanation of University Students' Crimes in Social Network Services (SNS상의 범죄행위 설명에 있어 사회학습이론과 보완적 논의의 검증)

  • Lee, Seong-Sik
    • Informatization Policy
    • /
    • v.22 no.4
    • /
    • pp.91-104
    • /
    • 2015
  • This study tests the effects of differential association, definitions, differential reinforcement and imitation from social learning theory in the explanation of university students' crimes in social network services. In addition, this study tests the interaction effects between social learning factors and other factors such as low self-control, subcultural environment, and crime opportunity for the integrated approach. Using data from 486 university students in Seoul, results show that both definition and imitation have significant influences on crimes, even though differential association and differential reinforcement factors have no significant influences on crimes in social network services. Results also reveal that there are significant interaction effects between definition and subcultural environment, which meana that definition has a strong effect on crimes in high subcultural environment. In addition, it is found that reinforcement has also a strong effect on crimes in high crime opportunity and that interaction effect between imitation and low self-control is significant, which means that imitation has a strong effect on crimes in low self-control students.

Information and Methodological Technologies of the Marketing Activity Management System in Higher Education Institutions

  • Fursykova, Tetiana;Boychuk, Inna;Baluk, Nadiia;Karpii, Olena;Korotka, Viktoriia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.383-390
    • /
    • 2021
  • The main purpose of the study is to determine the features of the functioning of the university as a part of the state structure in the context of marketing management n the context of storing information technologies. Students were obtained due to the following theoretical methods: systems of analysis and synthesis, induction and deduction, comparison, classification, generalization and systematization, idealization and abstraction. It is advisable to study the essence and nature of educational services, as well as the role of education in economic development, relying on the methodology of institutional theory, the theory of stakeholders, which makes it possible to assess the contribution of education to the harmonization of public and individual interests, the formation of appropriate structures and subjects of development, ensuring the building of intellectual potential and quality of life. The specificity of the functioning of the university as a part of the state structure in terms of managing marketing activities was characterized.