Smart phones play a significant part in the evolution IT industry. In domestic market, smart phones have grown rapidly. However, until today, precedent studies on smart phones, particularly about the reason why consumers use smart phones are uncommon. Thus, in this study we adopted IS continuance and habit theory to study smart phones' use behavior. The results reveal that perceived usefulness and perceived ease of use, satisfaction of smart phone usage, continuous use, and habit showed the causes and effects relationships. The results indicated that perceived usefulness and perceived ease of use had a positive effect on smart phone user satisfaction. Moreover, smart phone user satisfaction had a positive effect on the smart phone habits and explorative use. However, smart phone user satisfaction showed insignificant effect toward exploitive use. That is, satisfied users regularly use the smart phone but need to formulate habit of use, and then influence exploitive use. Habit showed a positive effect on both exploitive use and explorative use, Finally, we found that users are likely to pay more attention on new features of smart phones while they are using the devices.
The spread of mobile commerce due to popularization of smartphones not only broke down the boundary between online and offline, but also changed the consumer life, and hence brought change of commerce paradigm that creates new demand. The success of innovative information technology such as mobile shopping can be defined as an individual accepting the technology and continuously using it, but the studies on the usage behavior after the acceptance have been done in very restrictively, despite its importance. In this study, in order to empirically investigate the factors that influence the continuance in mobile shopping usage experience and its causal relationship, Social Cognitive Theory and Habit Theory were applied to IS Continuance Model, and the extended IS Continuance Model was suggested and proved. As a result, the usefulness, enjoyment, and self-efficacy perceived in usage experience significantly influence satisfaction, and usefulness, self-efficacy, and satisfaction influence habit. Also, usefulness, self-efficacy, satisfaction, and habit significantly influence continuance intention. This study provides a valuable asset in providing an opportunity to understand the usage behavior of mobile shopping service users after the acceptance, and furthermore proving directionality in improving customer loyalty.
Nowadays, aggressive driving is a common driving behavior and it is raised as a dangerous factor for both drivers and passengers. However, it is hard to find studies on aggressive driving in Korea, and even the definition of aggressive behavior is not clearly explained. In this study, the term "aggressive behavior" is defined based on previous studies, and the significance of several psycho-social factors which affect aggressive driving were verified with the 'habit' factor from the Theory of Planned Behavior (TPB). In the pilot study, domestic drivers reported that aggressive behaviors included speeding, traffic light signal violation, and improper passing (cutting drivers off when passing). In this study, controlling the demographic characteristics of these three aggressive behaviors, the authors explored the relationship of the behaviors with TPB factors such as the habit factor. Consequently, in the case of drivers' intentions for speeding and traffic light signal violations, subjective norm, perceived behavioral controllability, and habit were significant factors. In the case of intentions for improper passing, only perceived behavioral controllability and habit were significant. In speeding behavior and traffic light signal violations, only habit was significant besides intention; however, in improper passing, both perceived behavioral controllability and habit were significant besides intention. The authors also tested an alternative model including TPB and habit factors for three types of aggressive driving. Finally, there are several implications for a possible intervention program for aggressive driving, though there are some limitations of the study.
In the growth of IT industry, interest in wearable device has been globally rising along with the evolution of technology. A Smartwatch is expected to be at the center of wearable device industry in the future. However, there are some concerns that most of its actual sales are caused by gifts or bundling. Motivated by these issues, this study propounds the ideas that to enter the mainstream market, the empirical research is required for actual consumers who continue to use a smartwatch. The purpose of this study is to identify key factors affecting user satisfaction and antecedents affecting continuance intention to use from consumer perspectives. Further, assuming consumers' perceptions will be different according to how they acquired smartwatch, this study classified the group as direct buyers and acquired users. To achieve the purpose of the research, this study analyzes the usage of smartwatch by integrating the IS Success Model and IS Continuance and Habit Theory. We implemented the survey of 338 smartwatch users, and the research findings indicate that information quality and system quality have significant effects on satisfaction, and consequently satisfaction and habit positively affect the continuance intention to use. Additionally, it is found that there was a significant difference in the relationship between satisfaction and habit in the group divided by acquisition type. Based on these findings, this study provides theoretical and practical implications.
Mr. Cho OO, a famous ex-delinquent who has already spent 27 years in prison for his hardened stealing habit and escape, was recently again arrested by Japanese police for housrbreaking in Japan. Every Korean people would have believed that he had abandoned his habit for good, because, since his liberation in 1998 , he showed himself as a man perfectly cured. He became a believer more than ever, married a well-to-do beautiful woman, got a son from her, had a good income from his job as homme security counsellor and from several other occupations, and after all worked a lot for homeless and unfortunate. Now, his case is given as an important subject to approach for criminologists. As well as we are concerned, we thought, to explain his case criminological, it's primarily necessary to skim through the main criminological theories, and that in behalf of this case. After that, we will be able to decide which theory is mostly appropriate to explain his inveterate disease. The one we chose is the social learning theory. But this theory alone won't allow us to understand all aspects of his crime. This is why we will have to turn to several other theories to complete our explanation. But theoretical understanding alone of a criminal case is useless if it cannot suggest a remedy for it. And, we finish our study by making some suggestions on this case.
The rapid development of information and communication technology has made it for people to pirate digital contents easily and quickly. Although many studies have investigated the underlying factors that lead to an individual engaging in digital piracy, few studies have provided holistic and integrative view on this issue. Therefore, this study attempts to build integrative research model based on theory of planned behavior (TPB), norm activation model (NAM), and habit. For this purpose, this study develops nine hypotheses that explain the relationship between attitude, personal norm, habit, and behavioral intention, and tests them with survey data collected from 337 participants. The results of this study show that attitude, perceived behavioral control, personal norm, and habit have impact on behavioral intention of digital piracy while subjective norm does not affect behavioral intention. This study contributes to expand existing studies by identifying the relationship between attitude, personal norm, habit and behavioral intention.
The purposes of this study were to(a) develop theoretical modifications of the extended gate control theory of pain using Fishbein's model and(b) test the efficacy of these modifications. Attitude, social subjective norm, personal subjective norm, habit and state anxiety were operationalized to represent internal stimuli for the cognitive-evaluative and motivational-affective dimensions of the theory. Pain expression was operationalized as sensory and affective responses to pain, and pain endurance. Sixty-two female nurses from 20 to 50 years of age participated. A semantic differential scale measured attitude and motivations to comply; a Likerty-type scale measured personal and social norms and habit. Spielberger's STAI measured state anxiety, Pain was produced using a modified submaximum effort tourniquet technique. Pair expression was measured using ratio scales of sensory intensity and unpleasantness developed by Gracely and his associates. Pain endurance was measured by subtracting time of pain threshold from pain tolerance. The first hypothesis examining whether pain endurance would be more significantly related to the affective response than to the sensory response was net rejected. Four remaining hypotheses, testing the ability of the five variables to predict the sensory and affective responses were not rejected. However, the habit of pain expression and the attitude toward pain expression contributed to the prediction of both sensory and affective responses to pain. The interaction between the cognitive-evaluative and the sensory-discriminative dimensions and the interaction between the cognitive-evaluative and motivational-affective dimensions were partially supported by the data from these two variables. The interaction between the motivational-affective and the sensory-discriminative dimensions was also supported by the relationship of sensory to affective responses. The variables which did not significantly predict pain expression appeared to have potential for prediction. Revision and testing of the tools for better reliability, validity, and clinical usuability are needed. The study contributed to theory building. The identification of variables which pre-dict pain behavior must occur before effective nursing interventions can be developed.
Purpose: The purpose of this study was to use the theory of planned behavior, past habit and moral obligation to better understand the behavior of physical therapists (PTs) and occupational therapists (OTs) in protecting the medical information of patients. Methods: We conducted a survey using self-writting questionnaires structured within the framework of the theory of planned behavior to understand to analyze information from 103 clinical PTs and OTs in their efforts to protect patient medical information. Results: The PTs and OTs' medical information protecting behavior was 2.85 mean points. That point failed to reach 1.0 points. Behavior intention was 3.83 mean points. That was judged to be improved. Behavioral intention was closely correlated with behavior, behavioral attitude, subjective norms, behavior control, and past habit. Variables related to the theory of planned behavior, attitude, subjective norms, and perceived behavior control all explained 50% of the behavioral intention of PTs and OTs regarding future divulgence of patient information. The past habits of PTs and OTs were also a significant predictor in explaining the behavioral intention to protect a patient's medical information (p<0.01). Conclusion: Revising the behavioral attitudes, subjective norms, perceived behavior control, and past habits of PTs and OTs helped improve their behavior regarding protection of the medical information of patents.
Given social problems of social network service (SNS) addiction, it is critical to understand user's formation mechanism of SNS addiction. Since a number of studies have demonstrated the negative outcomes of excessive SNS use, the researchers examined important antecedents of SNS addiction as SNS habit that is considered as a key driver of SNS addiction. Moreover, the effects of self-expression, network management, and information search on SNS addition formation were investigated. The proposed theoretical model was empirically tested by using longitudinal survey data collected from 206 Facebook users. The analysis results indicate that SNS habit plays an important role in forming SNS addiction. Further, self-expression, network management, and information search influence SNS addiction through SNS habit. The analysis results offer some in-depth perspectives to SNS providers and government that establish policies or digital convergence strategies to induce healthy SNS use.
Ensuring the confidentiality of patient records is critical requirement for quality of care and in fulfilling legal obligation of healthcare organizations. This study analyzed the behavior of hospital employees who are dealing with confidential patient information in a hospital. Theory of Planned Behavior(TPB) model and TPB expanded models that add habit concept to TPB are tested for the validity in explaining the predisposing factors that affect the behavior of hospital employee in ensuring the confidentiality of patient records. Data were collected by administrating a survey to the 350 employee of a tertiary care hospital. Of the 350 questionaries distributed, 321 were responded resulting 92% of response rate. The mean differences among the groups classified by age, years of experience, gender, and occupation were analysis using ANOVA. The relationships among the concepts suggested in the models were analysed by applying the Structural Equations Modeling method. The results of ANOVA indicated significant mean differences in the frequency of confidentiality ensuing behavior. Administrative staff and medical technicians show higher frequency of ensuing behavior compared to the physicians and the nurses. And more experienced employee show more confidentiality ensuring behavior. The results of Structural Equations analysis showed that the strong effect of habit and attitude in predicting the behavior. However, the effect of perceived behavioral control was not significant. Based on the results the theoretical and practical implications are discussed.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.