• Title/Summary/Keyword: information theory

Search Result 7,464, Processing Time 0.035 seconds

Information Sharing on Blogosphere: An Impact of Trust and Online Privacy Concerns

  • Chai, Sang-Mi
    • Asia pacific journal of information systems
    • /
    • v.21 no.3
    • /
    • pp.1-18
    • /
    • 2011
  • Blog have become very popular with Internet users as one of the latest forms of online communication as well as knowledge sharing tools. However, blogs generate growing concerns regarding information privacy issues. This study, based on social exchange theory, presents results about bloggers' information sharing behavior. The 157 surveys are collected from a large university in the eastern U.S. The survey results indicate that trust which has four second order factors: economy based trust, trust in reciprocity, trust in other bloggers and trust in social interaction positively affects bloggers' information sharing behavior. However, online information privacy concerns have a negative impact on the relationship between trust and bloggers' information sharing behavior.

Why do We Share Information? Explaining Information Sharing Behavior through a New Conceptual Model between Sharer to Receiver within SNS

  • Seok Noh
    • Asia pacific journal of information systems
    • /
    • v.31 no.3
    • /
    • pp.392-414
    • /
    • 2021
  • Social networking services (SNS) is an indispensable method in order to obtain information of the Internet participants. The study identified three variables of social media communication, sharing culture, and online trust in terms of social capital theory (SCT) and reviewed intention& behavior variables in terms of theory of planned behavior (TPB). The data were collected from 330 samples of SNS user, and were involved, and the research model uses AMOS to make confirmatory factor analysis. The findings confirmed our hypothesis that social media communication, sharing culture, and online trust affect individuals' behaviors to sharing information. This study emphasizes that not only social media communication but also sharing culture to SNS can stimulate information sharing. while previous research has predominately focused on personal cognition or social network, the study examines the integrated influence of communication, culture and trust on information sharing in SNS. In sum, by explicating the unique role of social capital, this paper aims at contributing to the continued development and success of SNS in general.

Exploring the Information-Sharing Intention on Social Networking Sites

  • Shu-Mei Tseng
    • Asia pacific journal of information systems
    • /
    • v.33 no.2
    • /
    • pp.367-388
    • /
    • 2023
  • This study aimed to examine the factors of information-sharing intention on social networking sites (SNSs) by integrating the perspectives of the institution-based trust, social presence, and theory of reasoned action (TRA). An empirical survey was conducted and 364 valid respondents were collected from Facebook (FB) users in Taiwan. These data were analyzed against the research model using the partial least squares (PLS) structural equation modeling. The findings revealed that situational normality and structural assurance have a positive influenced user trust in SNSs which in turn increased their information-sharing attitudes. Furthermore, the subjective norms, user information-sharing attitudes and social presence of the SNSs were shown to have a positive influenced on user information sharing intention. Finally, this study provided several important theoretical and practical implications to understand factors affecting information-sharing intention on SNSs.

Joint Beamforming and Power Allocation for Multiple Primary Users and Secondary Users in Cognitive MIMO Systems via Game Theory

  • Zhao, Feng;Zhang, Jiayi;Chen, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.6
    • /
    • pp.1379-1397
    • /
    • 2013
  • We consider a system where a licensed radio spectrum is shared by multiple primary users(PUs) and secondary users(SUs). As the spectrum of interest is licensed to primary network, power and channel allocation must be carried out within the cognitive radio network so that no excessive interference is caused to PUs. For this system, we study the joint beamforming and power allocation problem via game theory in this paper. The problem is formulated as a non-cooperative beamforming and power allocation game, subject to the interference constraints of PUs as well as the peak transmission power constraints of SUs. We design a joint beamforming and power allocation algorithm for maximizing the total throughput of SUs, which is implemented by alternating iteration of minimum mean square error based decision feedback beamforming and a best response based iterative power allocation algorithm. Simulation results show that the algorithm has better performance than an existing algorithm and can converge to a locally optimal sum utility.

The Effect of IT Department Service Quality on Appropriateness of Information System (IT관리부서의 서비스 품질이 정보시스템의 전유에 미치는 영향)

  • Lee, Woong-Kyu
    • The Journal of Information Systems
    • /
    • v.16 no.1
    • /
    • pp.159-178
    • /
    • 2007
  • As generalization of using PC and the Internet information technology (IT) users in organizations are not passive clients but active producers of information services. One of the reasons for the change of users' role is social interactions with other users and IT department staffs. That is, users can find and develop new functions and usefulness of IT, especially, Web-based ones through communication with other users or IT department staffs. The objective of this study is to investigate the relationship between IT department service quality and social interactions with other users. For this purpose, we suggest a research model based on adaptive structuration theory (AST), which is to explain the changes in social structure (rules and resources) of IT by social interactions, as well as service quality theory. Our model's exogenous variable is service quality which is a second-order factor consisting of reliability, responsiveness, assurance, and empathy. As endogenous variables, we adopt two variables for appropriateness of using IT, faithfulness of appropriation and consensus on appropriation. Finally, dependent variables of ow model are usefulness and ease of use which can be considered as attitude on IT as well as other variables for appropriateness. For empirical test our model is applied to users of groupware and ERP in organizations and analyzed by partial least square. In result, all hypotheses suggested in our model are supported statistically.

  • PDF

모바일 데이터 서비스 사용량 증감에 영향을 미치는 요인들에 관한 연구;이요인 이론(Two Factor Theory)을 바탕으로

  • Lee, Sang-Hun;Kim, Il-Gyeong;Lee, Ho-Geun;Park, Hyeon-Ji
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.885-890
    • /
    • 2007
  • This study is to investigate factors that affect usage change in mobile data service (MDS). In the first, an exploratory study based on 378 survey responses was conducted to learn about important decision factors of MDS usage. It revealed discrepancy between the influencing forces of usage increase and those of usage decrease. Based on the findings from the exploratory study and the two-factor theory, we postulated information quality as the motivator and system quality as the de-motivator (or hygiene) of MDS. Then, a confirmative study was undertaken on their respective role in encouraging and discouraging the usage of mobile data service. A research model was proposed and subsequent hypotheses were empirically tested with partial least square (PLS) based on 478 responses from the users of mobile data service. It was learned that information quality (as a motivator) was positively associated with usage increase in mobile data service, but system quality (as a de-motivator) was not. Also, system quality was negatively associated with usage decrease, but information quality was not. Lastly, their association strength was partially moderated by the type of motivation for using MDS.

  • PDF

Automatic Document Summary Technique Using Fuzzy Theory (퍼지이론을 이용한 자동문서 요약 기술)

  • Lee, Sanghoon;Moon, Seung-Jin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.12
    • /
    • pp.531-536
    • /
    • 2014
  • With the very large quantity of information available on the Internet, techniques for dealing with the abundance of documents have become increasingly necessary but the problem of processing information in the documents is still technically challenging and remains under study. Automatic document summary techniques have been considered as one of critical solutions for processing documents to retain the important points and to remove duplicated contents of the original documents. In this paper, we propose a document summarization technique that uses a fuzzy theory. Proposed summary technique solves the ambiguous problem of various features determining the importance of the sentence and the experiment result shows that the technique generates better results than other previous techniques.

Security Enhancement of Public Organization Members Based on the Protection Motivation Theory (보호동기이론에 기반한 조직구성원의 보안강화 : 보안정책에 대한 신뢰와 보안스트레스의 매개효과를 중심으로)

  • Choi, Heeyoung;Kang, Juyoung
    • Journal of Information Technology Services
    • /
    • v.19 no.6
    • /
    • pp.83-95
    • /
    • 2020
  • "I think security is only trying to make it uncomfortable." "10% of my work is entering IDs and passwords, such as boot passwords, mobile phone authentication numbers, etc." As reflected in the complaint above, stress caused by information security among organizations' members is increasing. In order to strengthen information security, practical solutions to reduce stress are needed because the motivation of the members is needed in order for organizations to function properly. Therefore, this study attempts to suggest key factors that can enhance security while reducing information security stress among members of organizations. To this end, based on the theory of protection motivation, trust and security stress from information security policies are set as mediating factors to explain changes in security reinforcement behavior. Furthermore, risk, efficacy, and reaction costs of cyberattacks are considered as prerequisites. Our study suggests a solution to the security reinforcement problem by analyzing the factors that influence the behavior of members of organizations. In turn, this can raise protection motivation among members.

Exploring the Practical Value of Business Games: Analysis with Toulmin's Sensemaking Framework

  • Joo Baek Kim;Edward Watson;Soo Il Shin
    • Asia pacific journal of information systems
    • /
    • v.32 no.4
    • /
    • pp.803-829
    • /
    • 2022
  • With the advances in technology and the trend towards increased computer-based experiential learning in education settings, business games are being increasingly used by business educators. This article utilizes Toulmin's Sensemaking Framework to investigate the sensemaking process of business professionals to reveal how they consciously reason about the value of business games for learning complex business concepts and principles. Using the analysis of responses from 43 business professionals, our study identifies key areas where business professionals find value in business games and the limitations of using business games. First, business games are found to be an effective tool when teaching practical business skill sets to business professionals. Second, business games enhance the overall learning process in professional business training. Third, despite the advantages, some pitfalls in applying business games to practice are found. We also found sub-themes, claims, and argument patterns of how business professionals evaluate the value of business games through a grounded theory qualitative analysis method. Analysis results show several ground-warrant patterns exist in the arguments on values of business games including general principle - causal reasoning, personal experience - generalization, and personal projection - generalization. With these findings, we believe this paper contributes to the theory and practice of business game design, development, and the game playing and learning process.

Scientists' Information Behavior for Bridging the Gaps Encountered in the Process of the Scientific Research Lifecycle (과학기술분야 연구활동 단계별 문제상황 극복을 위한 정보행동 연구)

  • Lee, Jung-Yeoun;Chung, Eun-Kyung;Kwon, Na-Hyun
    • Journal of the Korean Society for information Management
    • /
    • v.29 no.3
    • /
    • pp.99-122
    • /
    • 2012
  • This study analyzed scientists information behaviors when they engage in solving specific research problems in various situations throughout the entire scientific R&D lifecycle process. In-depth interviews with a total of 24 scientists were conducted in their research laboratories, the scientists' everyday workplace and the contexts of scientific research. The theoretical and methodological frameworks employed for this study were Dervin's Sense-making, Savolainen's Everyday Life Information Seeking, and Engestrom's Activity Theory. The findings of this study informed context-specific research and information behaviors of the scientists in the 14 sub stages of the five-stage of R&D lifecycle. Specifically, the study revealed the research objectives and related information behaviors (e.g., information needs, information seeking, information sources and channels, information barriers, etc.) to achieve the objectives at each sub-stage. The study results provided essential information to re-design the information services and strategies that accommodate the scientific R&D lifecycle.