• Title/Summary/Keyword: dual process theory

Search Result 55, Processing Time 0.023 seconds

Developing the online reviews based recommender models for multi-attributes using deep learning (딥러닝을 이용한 온라인 리뷰 기반 다속성별 추천 모형 개발)

  • Lee, Ryun-Kyoung;Chung, Namho;Hong, Taeho
    • The Journal of Information Systems
    • /
    • v.28 no.1
    • /
    • pp.97-114
    • /
    • 2019
  • Purpose The purpose of this study is to deduct the factors for explaining the economic behavior of an Internet user who provides personal information notwithstanding the concern about an invasion of privacy based on the Information Privacy Calculus Theory and Communication Privacy Management Theory. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the computation theory of information privacy with the factors deducted from the management theory of communication privacy on the basis of the Dual-Process Theory. Findings According to the empirical analysis result, this study confirmed that the Privacy Concern about forms through the Perceived Privacy Risk derived from the Disposition to value Privacy. In addition, this study confirmed that the behavior of an Internet user involved in personal information offering occurs due to the Perceived Benefits contradicting the Privacy Concern.

A Study on Factors Influencing Privacy Decision Making on the Internet: Focus on Dual-Calculus Model (온라인 환경에서 프라이버시 의사결정에 영향을 미치는 요인에 관한 연구: 이중계산모델을 중심으로)

  • Kim, Sanghee;Kim, Jongki
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.197-215
    • /
    • 2016
  • Purpose This study aims to investigate the factors that influence decision making in relation to providing personal information on the internet with respect to the integration of the privacy calculus theory and protection motivation theory based on the dual-calculus model proposed by Li(2012). Design/methodology/approach The privacy calculus theory and protection motivation theory have been applied to explain privacy behavior to a certain degree but few studies have been conducted to explain privacy behavior based on the integration of these two theories. Although Li(2012) proposed the dual-calculus model, he only proposed its framework and did not carry out an empirical study. Therefore, this study proposes a research model that integrates these two theories and examines the relationship between the two theories through an empirical study. Findings According to the results of empirical analysis, it was found that all relations have statistically significant explanatory power except the relation between coping appraisal and privacy risk in the risk calculus process. Thus, the results verify that external threat played a decisive role in increasing the risk level of a consumer's privacy. It can be discussed the ways to enhance the privacy behavior of consumer on the internet through these findings.

A Study on the Internet User's Economic Behavior of Provision of Personal Information: Focused on the Privacy Calculus, CPM Theory (개인정보 제공에 대한 인터넷 사용자의 경제적 행동에 관한 연구: Privacy Calculus, CPM 이론을 중심으로)

  • Kim, Jinsung;Kim, Jongki
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.93-123
    • /
    • 2017
  • Purpose The purpose of this study is to deduct the factors for explaining the economic behavior of an Internet user who provides personal information notwithstanding the concern about an invasion of privacy based on the Information Privacy Calculus Theory and Communication Privacy Management Theory. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the computation theory of information privacy with the factors deducted from the management theory of communication privacy on the basis of the Dual-Process Theory. In addition, this study, did empirical analysis of the path difference between groups by dividing Internet users into a group having experience in personal information spill and another group having no experience. Findings According to the empirical analysis result, this study confirmed that the Privacy Concern about forms through the Perceived Privacy Risk derived from the Disposition to value Privacy. In addition, this study confirmed that the behavior of an Internet user involved in personal information offering occurs due to the Perceived Benefits contradicting the Privacy Concern.

A Study on the Characteristics Analysis of Cutting Fluid Aerosol Using Dual-PDA System(II) - for Cutting Fluid Aerosol Prediction in Turning Process (Dual-PDA를 이용한 절삭유 에어로졸 특성분석에 관한 연구(II) - 선삭공정의 절삭유 에어로졸 예측)

  • Chung, E.S.;Hwang, D.C.;Woo, C.K.;Hwang, J.
    • Journal of ILASS-Korea
    • /
    • v.10 no.2
    • /
    • pp.32-40
    • /
    • 2005
  • This paper presents the analytical approaches to predict cutting fluid aerosol formation characteristics in machining process. The prediction model which is based on the rotary atomization theory analyzes aerosol behaviors in terms of size and concentration. Experiments were tarried out to verify the aerosol formation prediction model under various operational conditions. The experimental results which are obtained by Dual-PDA measurement show resonable agreement with prediction results of aerosol concentration. This study can be provided as a basis to estimate and control the hazardous cutting fluid aerosol in machining process in view of environmental consciousness.

  • PDF

Children's Counterfactual Reasoning According to Task Conditions (과제특성에 따른 유아의 반사실적 연역추론)

  • Chung, Ha Na;Yi, Soon Hyung
    • Korean Journal of Child Studies
    • /
    • v.34 no.6
    • /
    • pp.1-11
    • /
    • 2013
  • The purpose of this study was to investigate the process of counterfactual reasoning which children undergo, based on mental model theory and dual process theory. The subjects were 120 four-year-olds and 120 five-year-olds from Ulsan. Counterfactual reasoning task conditions were created, including task type and content, which were type 1-specific, type 1-general, type 2-specific, type 2-general. There were two stories used for each task condition. Children's counterfactual reasoning score range was 0 to 8. Data were analyzed using SPSS by mean, standard deviation, one sample t-test, repeated measures of Anova. The results of this study were as follows. First, children's counterfactual reasoning was above chance level regardless of the task condition. Second, children's counterfactual reasoning was lowest when type 1-specific or type 2-specific tasks were given, slightly higher when type1-general tasks were given, and the highest when type 2-general tasks were given. There was no significant difference between 4-year-old and 5-year-old children's counterfactual reasoning.

Why Do People Spread Online Rumors? An Empirical Study

  • Jong-Hyun Kim;Gee-Woo Bock;Rajiv Sabherwal;Han-Min Kim
    • Asia pacific journal of information systems
    • /
    • v.29 no.4
    • /
    • pp.591-614
    • /
    • 2019
  • With the proliferation of social media, it has become easier for people to spread rumors online, which can aggravate the issues arising from online rumors. There are many individuals and organizations that are adversely affected by malicious online rumors. Despite their importance, there has been little research into why and how people spread rumors online, thus inhibiting the understanding of factors that affect the spreading of online rumors. With attention seeking to address this gap, this paper draws upon the dual process theory and the de-individuation theory to develop a theoretical model of factors affecting the spreading of an online rumor, and then empirically tests it using survey data from 211 individuals about a specific rumor. The results indicate that the perceived credibility of the rumor affects the individuals' attitudes toward spreading it, which consequently affects the rumor spreading behavior. Vividness, confirmation of prior beliefs, argument strength, and source credibility positively influence the perceived credibility of online rumors. Finally, anonymity moderates the relationship between attitude toward spreading online rumors and the spreading behavior.

Roles of Brand Loyalty in Determination of Smartphone Purchasing Intention (스마트폰 구매의도 결정에서 브랜드 충성도의 역할)

  • Lee, Woong-kyu;Park, Jin-Hoon
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.125-142
    • /
    • 2017
  • This study aims to identify and analyze the roles of incumbent smartphone's brand loyalty in smartphone adoption considering rational judgments and aesthetics evaluation. For this purpose, two hypotheses are developed based on dual process theory. For the validation of these hypotheses, G4, a smartphone brand from LG, was adopted as the target smartphone. The participants were university students in Korea, non-LG smartphones. In result, two hypotheses were statistically supported. This study showed that users with higher brand loyalty toward incumbent smartphone would be more sensitive to rational judgment while lower brand loyalty more sensitive to aesthetic evaluation.

A Study on the Influence of Victimization Experience and Awareness on Cyber Security Behavior - Focusing on Dual Process Theory (침해 경험 및 정보보호 인식이 정보보호 행동에 미치는 영향에 대한 연구 : 이중 프로세스 이론을 중심으로)

  • Kim, Chang-Il;Heo, Deok-Won;Lee, Hye-Min;Sung, Wook-Joon
    • Informatization Policy
    • /
    • v.26 no.2
    • /
    • pp.62-80
    • /
    • 2019
  • The purpose of this study is to investigate the direct effect of victimization experience on cyber security behavior and the indirect effect of information protection awareness through the Dual Process Theory. Baron & Kenny regression analysis was conducted and the results are as follows - first, victimization experience has a positive effect on cyber security behavior; second, the relationship between victimization experience and cyber security behavior is mediated by cyber security awareness; and third, the direct effect of victimization experience on cyber security behavior and the indirect mediating effect of cyber security awareness are both positive (+). The direct effect of victimization experience on cyber security behavior is analyzed to be relatively large compared to the indirect effect that cyber security awareness has on cyber security behavior. Based on these results, It is suggested that periodic cyber security education and campaign policies are needed to enhance cyber security behavior.

A Biographical Reconstruction of the Process Involving Changes in Elderly Support: From the Perspective of the Rural Elderly (노인부양의 변화과정에 대한 생애사적 재구성 - 농촌노인의 관점을 중심으로 -)

  • Yang, Yeung Ja
    • 한국노년학
    • /
    • v.29 no.1
    • /
    • pp.1-20
    • /
    • 2009
  • The purpose of the current research is to reconstruct the process in which changes in elderly support take place from the perspective of the elderly in rural areas. Six elderly couples were interviewed three times with the use of Schütze's 'autobiographical-narrative interview'. The entire interviews consisted of 17 sessions. Interviewed data was analyzed, following the method of Schütze's 'autobiographical-narrative interview analysis'. Research findings were as follows: Elderly support as experienced by the current elderly couples is mainly 'family support', which turned out to be 'dual structural shift' in the process of modernization. That is, there has been an 'internal structural shift' from 'family support on intergenerational, mutual support dimension' to 'family support on intragenerational self-support dimension' on the one hand. An 'external structural shift' has been noticed that realizes the 'socialization of family support' on the other hand. Additionally, a 'discrepancy' was captured between support norm and support behavior as occurred in the process of 'dual structural shift'. Perception on the 'dual structural shift' has proven 'ambivalent'. On the basis of these results, a critical discussion of modernization theory ensued, along with some implications for practice.

Design md Implementation of IEEE1394 Device Driver for Dual Kernel OS (이중 커널 구조의 OS를 위한 IEEE1394 디바이스 드라이버의 설계 및 구현)

  • Jung Gi-Hoon;Oh Ju-Yong;Kang Soon-Ju
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.3
    • /
    • pp.107-114
    • /
    • 2005
  • In this paper. we propose an architecture of IEEE1394 device driver for RTLinux. The device driver has two interfaces for applications running on the RTLinux kernel and Linux kernel. With the interfaces, the device driver simultaneously supports RT-Thread of RTLinux kernel and user level process of Linux kernel. This architecture could be a reference for designing other device driver on the dual kernel platform.