• 제목/요약/키워드: information factors

검색결과 17,659건 처리시간 0.044초

Influential Factors for COBIT Adoption Intention: An Empirical Analysis

  • Jo, Yoon-Sung;Lee, Jung-Hoon;Kim, Jae-Min
    • International Journal of Contents
    • /
    • 제6권4호
    • /
    • pp.79-89
    • /
    • 2010
  • In recent years, IT organizations are in the process of introducing IT Governance as the concept and measure of transparency, accountability and effectiveness of IT activities and control for managing governance processes. In this paper, the influential factors for IT organizations to adopt COBIT(The Control Objectives for Information and related Technology) which is a typical framework for effective IT Governance execution were classified and analyzed empirically into internal and external factors. Internal factors were designed based on influential factors in the theory of innovation diffusion, and external factors were designed based on influential factors from outside certification which were absent in COBIT and expertise support from the outside. The result of this study showed that understandability, transition and effectiveness which were internal factors had no effect on COBIT introduction, and only expertise support among certification and expertise support which were external factors had significant effects. This result shows that there are lack of COBIT supports and introduction in internal IT organizations. It is expected that the result of this study will allow strategic approach of COBIT adoption in future by verifying influential factors of COBIT introduction within IT organizations.

Facebook Users in United Arab Emirates: Underlying the Factors and Demographic Analysis

  • Mansumitrchai, Somkiat;Park, Choo-Hui;Chiu, Candy Lim
    • Asia Marketing Journal
    • /
    • 제16권1호
    • /
    • pp.117-132
    • /
    • 2014
  • This study examined the use of Facebook in United Arab Emirates. There were two objectives of this study. The first purpose was to identify the motive for the use of Facebook among people in U.A.E. This study conducted the survey using both qualitative and quantitative methods. One hundred eighty-three working people were used from the survey. Thirty-five questions identified from the interviews were used for the questionnaire design in quantitative method. Factor analysis showed six factors namely usefulness, usage, reliability, making new friends, ethical issue and openness of information. The total variance explained by all the factors was fifty-two percent. This study also examined the demographic variables whether they would play an important role in using the social network site. The study included two more variables, income and married status, which were not frequently examined by previous studies. MANOVA showed statistical significant differences (p < .01) across six factors. ANOVA results showed that gender variable affected only the factor of openness of information. Males were more likely to share their information compared to females. Income variable affected all the factors except the openness of information. The results showed that high-income people had the highest meanscores on three factors (usage, reliability, making new friends) while low-income people had the highest means on usefulness and ethical factors.Marital status had significant effects on usefulness, reliability, and ethical factors. Married people had the low scores on reliability and ethical factors. Lastly, education variable had no effect on all the factors examined.

  • PDF

대학생들의 개인정보관리 행태에 영향을 미치는 요인에 관한 연구 (A Study on the Factors Influencing College Students' Personal Information Management Behavior)

  • 이수연;이용정
    • 정보관리학회지
    • /
    • 제37권1호
    • /
    • pp.107-126
    • /
    • 2020
  • 정보의 급격한 증가와 정보기술이 발달함에 따라 개인에게도 정보관리의 중요성이 점차 커지고 있다. 본 연구는 대학생들의 개인정보관리 동기 요인과 방해 요인이 개인정보관리 행태에 어떠한 영향을 미치는지 알아보고자 하였다. 먼저, 선행연구 분석을 통해 개인정보관리 동기 요인과 방해 요인을 도출하였으며, 이러한 요인들이 개인정보관리 행태인 정보조직 활동과 정보유지 활동에 어떠한 영향을 미치는지 분석하였다. 이를 위해, 서울 소재 대학교의 대학생들을 대상으로 온라인 설문조사를 진행하였으며, 총 593부의 유효한 응답지를 분석하였다. 분석 결과, 개인정보관리 동기 요인과 방해 요인이 개인정보관리 행태에 영향을 미치는 것으로 나타났다. 본 연구는 개인의 정보관리 행태를 분석하고 행태에 영향을 미치는 요인을 도출하였다는 점에서 학문적 의의가 있다. 또한, 연구 결과를 바탕으로 대학생들이 개인정보를 효율적으로 관리할 수 있도록 개인정보관리 교육을 제공해야 한다는 실질적 함의를 제시하였다.

챗GPT의 서비스 품질과 정보 품질이 패션 제품의 구매의도와 구전의도에 미치는 영향 (Effects of the Service Quality and Information Quality of ChatGPT on Purchase Intention and Word of Mouth Intention for Fashion Products)

  • 박현혜;이윤선;신은정
    • 한국의류학회지
    • /
    • 제47권6호
    • /
    • pp.1038-1056
    • /
    • 2023
  • This study investigates the effects of ChatGPT's quality characteristics (service and information) on purchase intention and word of mouth intention. We distributed questionnaires among domestic men and women aged in their 20s and 30s who had experience of using ChatGPT. A total of 222 responses were subjected to frequency analysis, factor analysis, correlation analysis, and multiple linear regression analysis using the IBM SPSS statistical program version 26. The major findings were as follows: (1) The factors of service quality were categorized as Tangibility, Reliability, Empathy, and Assurance, while the factors of information quality were categorized as Recency, Accuracy, and Usefulness. (2) Among the service quality factors of ChatGPT, two factors (Reliability and Empathy) significantly impacted purchase intention, and three factors (Tangibility, Reliability, and Empathy) significantly affected word of mouth intention. (3) Among ChatGPT's information quality factors, two factors (Usefulness and Recency) had a significant effect on purchase intention, and two factors (Usefulness and Accuracy) exerted a significant influence on word of mouth intention. (4) Purchase intention had a significant effect on word of mouth intention.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

정보문제 해결능력 형성의 사회심리적 요인에 관한 연구 (A Study on the Socio-Psychological Factors in Forming Information Problem-solving Abilities)

  • 배경재
    • 한국문헌정보학회지
    • /
    • 제43권4호
    • /
    • pp.83-99
    • /
    • 2009
  • 정보사회에서 사회 구성원을 주체적인 정보문제 해결능력을 지닌 정보문해자로 만들기 위한 사회적 조건에 대한 문제는 문헌정보학에서 매우 중요한 연구 영역으로 다루어져 왔으나, 각 영향 요인들이 전체적인 관점에서 어떤 관계를 통해 정보문제 해결능력에 영향을 미치고 있는 가에 대한 연구는 미흡하였다. 본 연구는 세상과 자아간의 상호작용을 통해 개인이 경험적인 지식체계를 성립해 나간다는 사회심리학의 이론을 적용하여 전체적인 관점에서 청소년의 정보문제 해결능력에 영향을 미치는 사회심리적 요인이 무엇인지를 밝힌 후 이 요인들이 상호간에 유의미한 관계를 갖는 지 알아보고, 최종적으로 사회심리적 요인이 정보문제 해결능력에 어떤 영향을 미치는 지에 대해 실증적으로 분석하였다.

대학도서관 장서구성의 영향요인 분석- 부산대학교도서관 교육학장서를 중심으로 -

  • 김정근;김종성
    • 한국도서관정보학회지
    • /
    • 제21권
    • /
    • pp.1-55
    • /
    • 1994
  • The present survey aimed at analyzing factors influencing the development of the university library collection, with the special reference to the case of the Education Collection of the Pusan National University Library. For this, the present researchers have identified two areas of influencing factors, i.e.., library factors and user factors. Library factors included collection development policy, manpower, materials received as gift and budget. User factors included faculty and students. For analyzing the factors, the present researchers have relied on qualitative research techniques, using heavily documents produced within the case library, interviews librarians, faculty and students, and observation.

  • PDF

시스템 개발프로젝트에 있어서 팀제도 운영의 성공요인분석 (A Study of Critical Success Factors in System Development Team Operation)

  • 이재정;박문규
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제8권2호
    • /
    • pp.169-185
    • /
    • 1999
  • The overall objective of this study is to empirically investigate organizational/managerial factors affecting system development team operation. The contributions of this research project are two-fold. First, this study examined various organizational/managerial factors that made team operation successful. Second, we presented the key success factors among the identified success factors of team operation. A field investigation of 68 system development teams located around YoungNam area indicates that motivation, leadership and egalitarian team culture are success factors of team operation. Especially, key success factors are leadership and egalitarian team culture.

  • PDF

정보시스템 사용자만족도의 영향요인 및 성과요인에 대한 실증연구 - 수산협동조합 정보사용자 중심으로 - (A Empirical Study about the Influence Factors and Performance Factors of User Satisfaction : Based on National Federation of Fisheries Cooperatives)

  • 박철형;김하균
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제9권1호
    • /
    • pp.45-59
    • /
    • 2000
  • This study empirically tests that user satisfactions are influenced by factors focusing on information systems. The findings are as follows; 1. User Participation on information systems influence significantly system reliability, system usage and work environment. 2. Only top management's support on information system influences significantly efficient system usage. 3. Ability of user computing on information system influences significantly system usage.

  • PDF

정보보호정책 도입에 영향을 미치는 요인에 관한 연구 (Study on factors influencing adoption of information security policies)

  • 한영구;최명길;김세헌
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 2004년도 추계학술대회 및 정기총회
    • /
    • pp.636-639
    • /
    • 2004
  • Information security keeps enterprises information from the unintended disclose, modification and destruction and plays important roles especially in enterprise owing Internet based information systems. This study recognizes the importance of information security policy, analyzes factors influencing adoption of information security policy, and provides the factors for enterprises utilize them.

  • PDF