• Title/Summary/Keyword: information theory

Search Result 7,465, Processing Time 0.028 seconds

Effect of Consumers' Privacy Concerns on Information Disclosure Intentions for Size Recommendation Services Based on Body Information -Focusing on Privacy Calculus Theory (신체 정보를 활용한 사이즈 추천 서비스에 대한 소비자의 정보 프라이버시 염려와 정보 제공 의도 -프라이버시 계산 이론을 중심으로)

  • Sangwoo Seo
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.47 no.3
    • /
    • pp.442-458
    • /
    • 2023
  • This study aimed to elucidate the information privacy attitudes and behaviors of users of size recommendation services based on body information. Focusing on the privacy calculus theory, the effects of information privacy concerns as well as perceived risk and benefit of information disclosure on information disclosure intention were analyzed. Consumers who used size recommendation services based on body information were surveyed from August 18 to 24, 2022. Analysis of the 251 responses collected revealed that information privacy concerns did not significantly affect information disclosure intention. Information privacy concerns had a positive effect on perceived privacy risk; however, perceived privacy risk had a negative effect on information disclosure intention, while perceived privacy benefit had a positive effect on information disclosure intention. Therefore, the privacy calculus theory confirms the existence of the privacy paradox, revealing perceived privacy benefit has a greater impact on information disclosure intention than perceived privacy risk.

The Contrasting Attitudes of Reviewer and Seller in Electronic Word-of-Mouth: A Communicative Action Theory Perspective

  • Lee, Jung;Lee, Jae-Nam;Tan, Bernard C.Y.
    • Asia pacific journal of information systems
    • /
    • v.23 no.3
    • /
    • pp.105-129
    • /
    • 2013
  • This study draws important factors in electronic Word-of-Mouth (eWOM) and examines how these influence the building of customer loyalty. eWOM is viewed as social communication between customers and sellers, and thus the communicative action theory is applied. With the theory, we identify reviewer and seller as influential players on customers, and derive important factors such as correctness and veracity of reviews from the reviewers' action, and information compactness and adequacy from the seller's action. We propose these constructs as antecedents of customer loyalty and further hypothesize their curvilinear impacts as follows: the marginal impacts of veracity and correctness will decrease as veracity and correctness increase, and the marginal impacts of compactness and adequacy will increase as compactness and adequacy increase. The result indicates that only the seller's action has a curvilinear impact, whereas the reviewer has proportional positive impact on customer loyalty. This study indentifies important factors in eWOM from a critical social theory perspective and validates them using the positivistic approach. For practitioners, it discusses the important factors in eWOM with the identification of the individuals who are responsible for these factors.

Copula entropy and information diffusion theory-based new prediction method for high dam monitoring

  • Zheng, Dongjian;Li, Xiaoqi;Yang, Meng;Su, Huaizhi;Gu, Chongshi
    • Earthquakes and Structures
    • /
    • v.14 no.2
    • /
    • pp.143-153
    • /
    • 2018
  • Correlation among different factors must be considered for selection of influencing factors in safety monitoring of high dam including positive correlation of variables. Therefore, a new factor selection method was constructed based on Copula entropy and mutual information theory, which was deduced and optimized. Considering the small sample size in high dam monitoring and distribution of daily monitoring samples, a computing method that avoids causality of structure as much as possible is needed. The two-dimensional normal information diffusion and fuzzy reasoning of pattern recognition field are based on the weight theory, which avoids complicated causes of the studying structure. Hence, it is used to dam safety monitoring field and simplified, which increases sample information appropriately. Next, a complete system integrating high dam monitoring and uncertainty prediction method was established by combining Copula entropy theory and information diffusion theory. Finally, the proposed method was applied in seepage monitoring of Nuozhadu clay core-wall rockfill dam. Its selection of influencing factors and processing of sample data were compared with different models. Results demonstrated that the proposed method increases the prediction accuracy to some extent.

An Study on Efficiency and Use of Theories in Library and Information Science (문헌정보학 이론의 효율성과 활용성 연구)

  • 김성진;정동열
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.1
    • /
    • pp.23-53
    • /
    • 2004
  • The purpose of this study is to analyze the identity and relationship of library and information science by exploring theoretical aspects of LIS research, including theory building and theory use. The sample of this study consists of 1,661 research articles published from 1984 to 2003 in two Korean and two American core LIS journals. Theory articles are analyzed with two scales, such as '4-degree of theory efficiency' and '5-degree of theory use' Each article is coded in terms of journal, country, publication year, subfield, and methodology of the article. and affiliation, department, and research experience of the first author. The theories used therein are coded according to their origin and age. Also, an author co-citation technique is applied to represent intellectual structure on a two-dimensional map, which has been constructed by theory use of LIS authors fur 20 years.

A Study of Business Information Management of Ethical Analysis (기업정보관리의 윤리적 분석에 관한 연구)

  • Jang Ik-Seon
    • Management & Information Systems Review
    • /
    • v.1
    • /
    • pp.167-191
    • /
    • 1997
  • 1. Today mass communication informs us of the unethical behaviors of business almost everyday and the social interest about them including individuals implicated in loss and gain grows larger. It is the real aspect that business manager and scholars do not cope with the situation. 2. Five business ethical scales as justice theory, relativism, egoism, utilitarianism, deontological theory and information ethics were applied to this thesis. 3. Hypothesis : There will he a difference in the response on five ethical scales and the recognition degree of information ethics with consumers. 4. The response on five ethical scales with the sex of consumers showed a significant difference but that with the age showed a little difference that with the academic career showed a significant difference in justice theory, relativism, utilitarianism and deontological theory 5. The recognition degree of information ethics with the age and academic career of consumers showed a significant difference and the hypothesis was accepted, but that with the sex showed a little difference.

  • PDF

Conflict Resolution: Analysis of the Existing Theories and Resolution Strategies in Relation to Face Recognition

  • A. A. Alabi;B. S. Afolabi;B. I. Akhigbe;A. A. Ayoade
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.166-176
    • /
    • 2023
  • A scenario known as conflict in face recognition may arise as a result of some disparity-related issues (such as expression, distortion, occlusion and others) leading to a compromise of someone's identity or contradiction of the intended message. However, addressing this requires the determination and application of appropriate procedures among the various conflict theories both in terms of concepts as well as resolution strategies. Theories such as Marxist, Game theory (Prisoner's dilemma, Penny matching, Chicken problem), Lanchester theory and Information theory were analyzed in relation to facial images conflict and these were made possible by trying to provide answers to selected questions as far as resolving facial conflict is concerned. It has been observed that the scenarios presented in the Marxist theory agree with the form of resolution expected in the analysis of conflict and its related issues as they relate to face recognition. The study observed that the issue of conflict in facial images can better be analyzed using the concept introduced by the Marxist theory in relation to the Information theory. This is as a result of its resolution strategy which tends to seek a form of balance as result as opposed to the win or lose case scenarios applied in other concepts. This was also consolidated by making reference to the main mechanisms and result scenario applicable in Information theory.

Computational Processing of Korean Dialogue and the Construction of Its Representation Structure Based on Situational Information (상황정보에 기반한 한국어대화의 전산적 처리와 표상구조의 구축)

  • Lee, Dong-Young
    • The KIPS Transactions:PartB
    • /
    • v.9B no.6
    • /
    • pp.817-826
    • /
    • 2002
  • In Korean dialogue honorification phenomenon may occur, an honorific pronoun may be used, and a subject or an object may be completely omitted when it can be recovered based on context. This paper proposes that in order to process Korean dialogue in which such distinct linguistic phenomena occur and to construct its representation structure we mark and use the following information explicitly, not implicitly : information about dialogue participants, information about the speech act of an utterance, information about the relative order of social status for the people involved in dialogue, and information flow among utterances of dialogue. In addition, this paper presents a method of marking and using such situational information and an appropriate representation structure of Korean dialogue. In this paper we set up Korean dialogue representation structure by modifying and extending DRT (Discourse Representation Theory) and SDRT (Segmented Discourse Representation Theory). Futhermore, this paper shows how to process Korean dialogue computationally and construct its representation structure by using Prolog programming language, and then applies such representation structure to spontaneous Korean dialogue to know its validity.

Analysis of National Critical Information Infrastructure (NCII) Protection Policy Promotion System Based on Modified Policy Model Theory (수정된 정책모형이론에 기반한 국가정보통신기반시설 보호정책 추진체계 분석)

  • Ji-yeon Yoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.347-363
    • /
    • 2024
  • As the number of cyberattacks against the National Critical Information Infrastructure (NCII) is steadily increasing, many countries are strengthening the protection of National Critical Information Infrastructure (NCII) through the enactment and revision of related policies and legal systems. Therefore, this paper selects countries such as the United States, the United Kingdom, Japan, Germany, and Australia, which have established National Critical Information Infrastructure (NCII) protection systems, and compares and analyzes the promotion system of each country's National Critical Information Infrastructure (NCII) protection policy. This paper compares the National Critical Information Infrastructure (NCII) protection system of each country with the cybersecurity system and analyzes the promotion structure. Based on the policy model theory, which is a modification of Allison's theory and Nakamura & Smallwood's theory, this paper analyzes the model of each country's promotion system from the perspective of policy-making and policy-execution. The United States, Japan, Germany, and Australia's policy-promotion model is a system-strengthening model in which both policy-making and policy-execution are organized around the protection of the National Critical Information Infrastructure (NCII), while the United Kingdom and South Korea's policy-promotion model is an execution-oriented model that focuses more on policy-execution.

Library Service Users' Information Seeking Behavior Model Based on the Grounded Theory Methodology (근거이론방법론을 바탕으로 한 도서관서비스 이용자의 정보추구행태모델 제안)

  • Lee, Seong-Sin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.1
    • /
    • pp.5-28
    • /
    • 2010
  • This study analyzed the characteristics of library service users' information seeking behavior based on the grounded theory methodology. After interviewing twelve undergraduate students, the researcher coded the data based on the grounded theory methodology. As a result of the entire coding processes, this study constructed the library service users' information seeking behavior model. According to the model, the following ten factors are important when explaining library service users' information seeking behavior: the information users' environment, other people, users' experiences, recognition of information sources, information provided, memory, a need-creating environment, information gathering, information use, and satisfaction and/or dissatisfaction.