• Title/Summary/Keyword: information behavior research

Search Result 2,989, Processing Time 0.034 seconds

Analysis of the Effects of Information Security Policy Awareness, Information Security Involvement, and Compliance Behavioral Intention on Information Security behavior : Focursing on Reward and Fairness (정보보안 정책 인식과 정보보안 관여성, 준수 의도성이 정보보안 행동에 미치는 영향 분석: 보상 차원과 공정성 차원을 중심으로)

  • Hu, Sung-ho;Hwang, In-ho
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.91-99
    • /
    • 2020
  • The aim of this study to assess the effect of information security policy awareness, information security involvement, compliance behavioral intention on information security behavior The research method is composed of a cross-sectional design of reward and fairness. This paper focuses on the process of organizational policy on the information security compliance intention in the individual decision-making process. As a result, the reward had a significant effect on compliance behavioral intention, and it was found that influence of the psychological reward-based condition was greater than the material reward-based condition. The fairness had a significant effect on information security policy awareness, information security involvement, information security behavior, and it was found that influence of the equity-based condition was greater than the equality-based condition. The exploration model was verified as a multiple mediation model. In addition, the discussion presented the necessary research direction from the perspective of synergy by the cultural environment of individuals and organizations.

Cognitive Bias and Information Security Research: Research Trends and Opportunities

  • Park, Jongpil;Oh, Chang-Gyu
    • Asia pacific journal of information systems
    • /
    • v.26 no.2
    • /
    • pp.290-298
    • /
    • 2016
  • Human cognition and decision-making related to information systems (IS) is a major area of interest in IS research. Among these areas, cognitive bias rooted in behavioral economics is gaining considerable attention from researchers. In the present study, we identify the role of cognitive biases and discuss how they shape the information security behavior. We also seek research opportunities to provide directions and implications for future research.

A study on online WOM search behavior based on shopping orientation (의복쇼핑성향에 따른 온라인 구전 정보탐색행동에 관한 연구)

  • Lee, Angie;Rhee, YoungJu
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.20 no.4
    • /
    • pp.57-71
    • /
    • 2018
  • Since consumers have become more comfortable with providing and receiving information online, 'online word of mouth' has been gaining consideration as one of the major information sources. Also, the shopping orientation of consumers has been proven to be an important determinant of consumer behavior. Therefore, the study investigated the differences in online WOM behavior based on shopping orientation. Hedonic, loyal, and syntonic styles were the types of shopping orientation considered, and the study focused on information retrieval tendencies, the motivation of online WOM search, searching online WOM sources, and the contents for the online WOM behavior. The research conducted an off-line survey targeting females in their twenties. The total number of data sets used in the empirical study was 125, and these were analyzed by SPSS 20.0: factors analysis, Cronbach's ${\alpha}$, k-means cluster, ANOVA, Duncan's multiple range test, Kruskal-Wallis, Mann-Whitney, and Bonferroni correction. The participants were divided into 3 kinds of shopping orientation groups named 'trend-pursuit', 'passive', and 'loyal'. As a result, there were significant differences in online WOM behavior discovered between the groups. Firstly, the 'trend-pursuit' group had the highest number of ongoing searches while the 'loyal' group had the highest number of pre-purchase search. Secondly, the 'trend-pursuit' and 'loyal' groups both had the motivations of online WOM search, hedonic and utility, whereas the 'passive' group had the lowest motivations for both motivations. Thirdly, the 'loyal' group frequently referred to reviews on shopping malls as online WOM sources. The research provided a better understanding of the online WOM behavior of present consumers and suggests that fashion related corporations map out marketing strategies with the understanding of these behaviors.

Marketer-Generated Content Sharing Among Social Broadcasting Users: Effects of Intrinsic Motivations, Social Capital and the Moderating Role of Prevention Focus

  • Li, Yuhao;Wang, Kanliang
    • Asia pacific journal of information systems
    • /
    • v.25 no.4
    • /
    • pp.719-745
    • /
    • 2015
  • Social networking services provide individuals with an easy approach for exchanging messages with others based on interpersonal relationships. However, why individuals spread marketer-generated content (MGC) in their online social circles remains unclear. Therefore, we develop a theoretical model to examine how social capital, intrinsic motivations, personal perceptions, past behavior, and personal traits influence MGC sharing behavior of social media users in micro-blogging context. Data collected from 319 social networking users support the proposed model. The results from partial least squares analyses show that enjoyment, perceived control, and outcome expectations are significant indicators of individual's MGC sharing intention in the social broadcasting environment. Results also suggest that social capital, users' intention, and past behavior positively influence the MGC sharing behavior of users. Moreover, individual prevention pride exhibits a significant interaction effect on the relationships between users' MGC sharing and its antecedents. Implications for research and practice are discussed.

Online Searching Behavior of Social Science Researchers' in IR Interfaces of E-journal Database Systems: A Study on JMI, JNU, and DU

  • Kumar, Shailendra;Rai, Namrata
    • Journal of Information Science Theory and Practice
    • /
    • v.1 no.4
    • /
    • pp.48-66
    • /
    • 2013
  • The aim of this study is to examine the user's online searching behavior in IR interfaces of e-journal database systems. The study is purely based on survey methods and tries to analyse the online searching behavior of respondents of social science disciplines who were doing research in three target central universities of Delhi (i.e. DU, JMI, and JNU). For measuring the responses of the respondents in IR interfaces of e-journal database systems, a total of 396 questionnaires were distributed among the students and out of all, 305 responses were used for the study. The findings of the study reveal that most of the students were not using all the facilities offered in IR interfaces of e-journal database systems for their retrieval process and also encourages menu based searches rather than command based searching.

Nationwide Comparison of Postal Motorcyclists' Driving Behavior and their Workloads using V-World Platform (브이월드를 활용한 집배 이륜차 운전자들의 운전 행동과 업무 부하의 비교 분석)

  • Jo, Jung Hee;Jang, In Sung;Kim, Hyun Suk
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.25 no.2
    • /
    • pp.39-47
    • /
    • 2017
  • Although motorcycle safety studies to date have identified the causes of motorcycle accidents in general, very few have investigated postal motorcycle accidents by studying the delivery postmen's specific work environment. To better understand postal motorcyclists' driving behavior associated with their delivery workload, we developed a system using V-World platform which visualizes driving behavior in real time along the driver's delivery route throughout an entire work day. We conducted a field test to examine the feasibility of our system by involving six delivery postmen currently working in Songpa, Seocheongju, and Gangseo, respectively. To show the potential of our system for nationwide comparison of postal motorcyclists' driving behavior and their workloads, we present several sample analyses using the collected field data. Although ideally, postmen's workloads should be standardized nationwide, we found large variation depending on regional characteristics of work area which affects postmen's driving behavior.

An Effect of Clothing Purchasing Situation on Perceived Risk and Information Search Behavior (의복구매상황에 따른 위험지각과 정보원 활용에 대한 연구 - 자기사용 상황과 선물구매 상황을 중심으로 -)

  • 임경복
    • The Research Journal of the Costume Culture
    • /
    • v.8 no.3
    • /
    • pp.450-459
    • /
    • 2000
  • The purpose of this study was to test the effect of the clothing purchasing situation on the preceived risk and information search behavior. Data were obtained from 369 students who were studying in Semyung University. The results of this study were as follows : 1. Students gave the clothing to their favorites as a gift 1 to 2 times in a year. And they thought self using purchasing was more important than gift giving purchasing. 2. In gift giving purchasing, perceived risks were higher than self using purchasing. But the economic risk was the exception. In that case, students showed more information search behavior except family search source. 3. According to the situation, main and interactive effect of sex and involvement level on perceived risk and information search behavior were significant. In self using purchasing, involvement level had the main effect to the type of information search behavior. But the family search source was the exception Also in gift giving purchasing, they showed the same results. In self using purchasing, main effects of sex and involvement level on perceived risk were significant. Also in gift giving purchasing, they showed the same results, but the socio-psychological risk was the exception.

  • PDF

Collective Interaction Filtering Approach for Detection of Group in Diverse Crowded Scenes

  • Wong, Pei Voon;Mustapha, Norwati;Affendey, Lilly Suriani;Khalid, Fatimah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.912-928
    • /
    • 2019
  • Crowd behavior analysis research has revealed a central role in helping people to find safety hazards or crime optimistic forecast. Thus, it is significant in the future video surveillance systems. Recently, the growing demand for safety monitoring has changed the awareness of video surveillance studies from analysis of individuals behavior to group behavior. Group detection is the process before crowd behavior analysis, which separates scene of individuals in a crowd into respective groups by understanding their complex relations. Most existing studies on group detection are scene-specific. Crowds with various densities, structures, and occlusion of each other are the challenges for group detection in diverse crowded scenes. Therefore, we propose a group detection approach called Collective Interaction Filtering to discover people motion interaction from trajectories. This approach is able to deduce people interaction with the Expectation-Maximization algorithm. The Collective Interaction Filtering approach accurately identifies groups by clustering trajectories in crowds with various densities, structures and occlusion of each other. It also tackles grouping consistency between frames. Experiments on the CUHK Crowd Dataset demonstrate that approach used in this study achieves better than previous methods which leads to latest results.

A Study on the Analysis and the Improvement of the MyData System from a Consumer Behavior Perspective (소비자행동 측면에서의 마이데이터 제도 분석 및 개선방안 연구)

  • Young-Jong Lee;Seong-Yeob Lee
    • Industry Promotion Research
    • /
    • v.9 no.3
    • /
    • pp.163-174
    • /
    • 2024
  • MyData is a new entity that strengthens the rights of information subjects through the 'right to data portability' and utilizes data to enable hyper-personalized services using personal information. Korea's MyData system is recognized globally as an outstanding system in that it is creating a new MyData industry by granting the right to information self-determination through the 'right to request data transmission'. Now in its third year, this study evaluates Korea's MyData system from a consumer behavior perspective and identifies issues for improvement. To this end, this study reviewed previous research on the relationship between regulatory policy and consumer behavior to determine the applicability of a consumer behavior perspective in institutional evaluation. In addition, in a study on consumer behavior related to MyData, variables that affect the use of MyData were investigated and evaluation items from a consumer behavior perspective were derived. As a result of evaluating Korea's MyData system from a consumer behavior perspective, it was found that the factors considered important by consumers were appropriately reflected in the system. However, in cases where there are dual values of ease of use and personal information protection, regulatory aspects tend to take priority. Therefore, in order to revitalize the MyData industry, it is essential to implement market-friendly system improvements without compromising consumer rights. This study is differentiated from existing studies in that it attempted to derive a plan for system improvement by combining empirical consumer behavior research and regulatory policy research.

Why Do Mobile Device Users Take a Risky Behavior?: Focusing on Model of the Determinants of Risk Behavior (모바일 기기 사용자는 왜 정보보호에 위험한 행동을 하는가? : 위험행동 결정요인 모델을 중심으로)

  • Kim, Jongki;Kim, Jiyun
    • The Journal of Information Systems
    • /
    • v.28 no.2
    • /
    • pp.129-152
    • /
    • 2019
  • Purpose The purpose of this study is to empirically identify the risky behavior of mobile device users using the Internet of Things on a situational perspective. Design/methodology/approach This study made a design of the research model based on model of the determinants of risk behavior. Data were collected through a survey including hypothetical scenario. SmartPLS 2.0 was used for the structural model analysis and t-test was conducted to compare the between normal and situational behavior. Findings The results were as follows. First, the central roles of risk propriety and risk perception were verified empirically. Second, we identified the role of locus of control as a new factor of impact on risky behavior. Third, mobile risk propensity has been shown to increase risk perception. Fouth, it has been shown that risk perception does not directly affect risky behavior and reduce the relationship between mobile risk propensity and risk behavior. According to the empirical analysis result, Determinants of risk behavior for mobile users were identified based on a theoretical framework. And it raised the need to pay attention to the impact of locus of control on risk behavior in the IS security field. It provided direction to the approach to risky behavior of mobile device users. In addition, this study confirmed that there was a possibility of taking risky behavior in the actual decision-making.