• Title/Summary/Keyword: information behavior model

Search Result 2,083, Processing Time 0.029 seconds

Proper Incentives to Promote Information Exchange

  • Obayashi, Atsuomi
    • Industrial Engineering and Management Systems
    • /
    • v.6 no.1
    • /
    • pp.55-63
    • /
    • 2007
  • Exchange of information is essential to the process of innovation such as product development. However, in many cases innovation fails because of a lack of knowledge sharing among parties concerned, even if parties individually have pieces of useful knowledge and skills. Besides physical factors like communication costs, the possibility of opportunistic behavior by parties like stealing ideas can discourage information exchange. This paper introduces a model to analyze incentives of information exchange. The model is a game by two players who alternately opt to offer information to the partner. It is suggested that information exchange can stop before reaching the efficient level. In order to attain the efficient information exchange, expectation of mutual benefit and absence of opportunistic motives in both players are needed. Methods for promoting information exchange include modifying payoff structure to meet the condition of information exchange. The fluidity of partnership may increase a variety of information exchange partners, but discourage building trust between partners which promotes information exchange.

Aiding the operator during novel fault diagnosis

  • Yoon, Wan-C.;Hammer, John-M.
    • Journal of the Ergonomics Society of Korea
    • /
    • v.6 no.1
    • /
    • pp.9-24
    • /
    • 1987
  • The design and philosophy are presented for an intelligent aid for a hyman operator who must diagnose a novel fault in a physical system. A novel fault is defined as one that the operator has not experienced in either real system operation or training. When the operator must diagnose a novel fault, deep reasoning about the behavior of the system components is required. To aid the human operator in this situation, four aiding approaches which provide useful information are proposed. The aiding information is generated by a qualitative, component-level model of the physical system. Both the aid and the human are able to reason causally about the system in a cooperative search for a diagnosis. The aiding features were designed to help the hyman's use of his/her mental model in predicting the normal system behavior, integrating the observations into the actual system behavior, or finding discrepancies between the two. The aid can also have direct access to the operator's hypotheses and run a hypothetical system model. The different aiding approaches will be evaluated by a series of experiments.

  • PDF

Design and Empirical Study of an Online Education Platform Based on B2B2C, Focusing on the Perspective of Art Education

  • Hou, Shaopeng;Ahn, Jongchang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.726-741
    • /
    • 2022
  • The purpose of this study is to provide instructive theoretical models for art (music) education institutions especially when unpredictable risks, such as pandemics, occur again. Based on the customer behavior theory of the business-to-business-to-customer (B2B2C) platform, and in combination with the technology acceptance model (TAM) and expectation confirmation model (ECM), this study proposes an online education model from the perspective of art education. The framework is based on the three decision-making processes of the customer, and includes the product owner, content owner, and customer area. This paper highlights the factors that influence customers in making decisions when art education institutions are product owners. Regression analysis was introduced to study the factors influencing the expectation confirmation, and the overall fitting testing and six hypotheses testing of 385 effective samples were performed using the structural equation modeling (SEM). The results show that the course-design and after-service positively influenced the expectation confirmation, and the domain image positively influenced the continuance behavior. Negative emotions skipped the mediator (expectation confirmation) and directly exerted a significant negative impact on customers' willingness to continue system usage (continuance behavior). In addition, expectation confirmation positively influenced continuance behavior. The paths of detailed items comprising course-design, after-service, and negative emotion were also analyzed and discussed. In this path analysis, ordinary art learners did not believe that AI partners can play a very good auxiliary role. The findings contribute to the scope of information systems acting as an art education platform academically, and provide effective and theoretical support for the actual operation of art education institutions.

Role of Management and Protection Motivation's influence on the Intention of Compliance with Information Security Policies: Based on the Theory of Planned Behavior (경영진 역할과 보호동기 요인이 정보보안정책 준수 의지에 미치는 영향: 계획행동이론을 기반으로)

  • Shin, Hyuk;Kang, Min Hyung;Lee, Cheol Gyu
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.69-84
    • /
    • 2018
  • This study examines antecedents of the intention of compliance with information security policies based on Ajzen's Theory of Planned Behavior. The study conducted the following: Verification of casual relations between role of management and protection motivation and the antecedents of planned behavior as parameters to determine the effect on the intention of compliance with information security policy, and comparative analysis between the research model and a competition model. The result of the study disclosed that, in the research model, attitude and subjective norm took an intermediary role on management beliefs, response efficacy, response cost, self-efficacy, and compliance intention, and perceived behavior control on management beliefs, self-efficacy and compliance intention.

  • PDF

A Fuzzy-based Inference Model for Web of Trust Using User Behavior Information in Social Network (사회네트워크에서 사용자 행위정보를 활용한 퍼지 기반의 신뢰관계망 추론 모형)

  • Song, Hee-Seok
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.4
    • /
    • pp.39-56
    • /
    • 2010
  • We are sometimes interacting with people who we know nothing and facing with the difficult task of making decisions involving risk in social network. To reduce risk, the topic of building Web of trust is receiving considerable attention in social network. The easiest approach to build Web of trust will be to ask users to represent level of trust explicitly toward another users. However, there exists sparsity issue in Web of trust which is represented explicitly by users as well as it is difficult to urge users to express their level of trustworthiness. We propose a fuzzy-based inference model for Web of trust using user behavior information in social network. According to the experiment result which is applied in Epinions.com, the proposed model show improved connectivity in resulting Web of trust as well as reduced prediction error of trustworthiness compared to existing computational model.

  • PDF

Analysis of Information Behavior in Determination of Product Specifications Based on a Conjoint Measurement Approach and a Fusion Model

  • Ishii, Kazuyoshi;Ichimura, Takaya;Hiraki, Shusaku
    • Industrial Engineering and Management Systems
    • /
    • v.2 no.1
    • /
    • pp.55-62
    • /
    • 2003
  • This paper deals with the difficulties involved in analyzing and designing a management system to reduce the risks and improve the productivity of new product development. In this paper, a method is described to analyze user information and determine product specifications based on a stimulus-response model, the conjoint measurement of users needs, and product characteristics deployment. The proposed method can analyze the effect of a partial price on the contribution ratio based on the order of preference of product profiles through a smaller number of product profiles. The strengths and weaknesses of this method are examined as the method is applied to the case study of a mobile computer intended for personal use.

Viscoelastic behavior on composite beam using nonlinear creep model

  • Jung, Sung-Yeop;Kim, Nam-Il;Shin, Dong Ku
    • Steel and Composite Structures
    • /
    • v.7 no.5
    • /
    • pp.355-376
    • /
    • 2007
  • The purpose of this study is to predict and investigate the time-dependent creep behavior of composite materials. For this, firstly the evaluation method for the modulus of elasticity of whole fiber and matrix is presented from the limited information on fiber volume fraction using the singular value decomposition method. Then, the effects of fiber volume fraction on modulus of elasticity of GFRP are verified. Also, as a creep model, the nonlinear curve fitting method based on the Marquardt algorithm is proposed. Using the existing Findley's power creep model and the proposed creep model, the effect of fiber volume fraction on the nonlinear creep behavior of composite materials is verified. Then, for the time-dependent analysis of a composite material subjected to uniaxial tension and simple shear loadings, a user-provided subroutine UMAT is developed to run within ABAQUS. Finally, the creep behavior of center loaded beam structure is investigated using the Hermitian beam elements with shear deformation effect and with time-dependent elastic and shear moduli.

Friendship Influence on Mobile Behavior of Location Based Social Network Users

  • Song, Yang;Hu, Zheng;Leng, Xiaoming;Tian, Hui;Yang, Kun;Ke, Xin
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.126-132
    • /
    • 2015
  • In mobile computing research area, it is highly desirable to understand the characteristics of user movement so that the user friendly location aware services could be rendered effectively. Location based social networks (LBSNs) have flourished recently and are of great potential for movement behavior exploration and datadriven application design. While there have been some efforts on user check-in movement behavior in LBSNs, they lack comprehensive analysis of social influence on them. To this end, the social-spatial influence and social-temporal influence are analyzed synthetically in this paper based on the related information exposed in LBSNs. The check-in movement behaviors of users are found to be affected by their social friendships both from spatial and temporal dimensions. Furthermore, a probabilistic model of user mobile behavior is proposed, incorporating the comprehensive social influence model with extent personal preference model. The experimental results validate that our proposed model can improve prediction accuracy compared to the state-of-the-art social historical model considering temporal information (SHM+T), which mainly studies the temporal cyclic patterns and uses them to model user mobility, while being with affordable complexity.

An Investigation on Consumer's Internet Shopping Behavior Explained By the Technology Acceptance Model (혁신기술수용모델(TAM)을 응용한 인터넷쇼핑행동 고찰)

  • Koo, Dong-Mo
    • Asia pacific journal of information systems
    • /
    • v.13 no.1
    • /
    • pp.141-170
    • /
    • 2003
  • This study investigates internet shopping behavior of consumers. The rapid growth of the internet shopping markets is solely dependent on the voluntary adoption of internet shopping medium by the personal users. But the studies on this topic are very limited. Based on these facts, this study, recognizing the internet shopping medium as an innovation, studies how consumers understand and use innovative internet shopping medium by applying and extending the technology acceptance model proposed by Davis et. al.(1989). The results of the survey on 947 consumer panel reveal that compatibility, system quality have positive impact on the formation of perceived ease of use. And it is also shown that the perceived ease of use, system quality, and compatibility have positive influence on perceived usefulness, but computer-efficacy has no effect on perceived usefulness. Meanwhile, it is confirmed that perceived usefulness and compatibility have positive effect on attitude toward internet shopping behavior, but perceived ease of use has no effect. In addition, perceived security and social norm, as opposed to the hypotheses, are shown to have no effect on internet shopping behavior. Lastly, applications and related limitations are discussed.

A Novel Abnormal Behavior Detection Framework to Maximize the Availability in Smart Grid

  • Shin, Incheol
    • Smart Media Journal
    • /
    • v.6 no.3
    • /
    • pp.95-102
    • /
    • 2017
  • A large volume of research has been devoted to the development of security tools for protecting the Smart Grid systems, however the most of them have not taken the Availability, Integrity, Confidentiality (AIC) security triad model, not like CIA triad model in traditional Information Technology (IT) systems, into account the security measures for the electricity control systems. Thus, this study would propose a novel security framework, an abnormal behavior detection system, to maximize the availability of the control systems by considering a unique set of characteristics of the systems.