• Title/Summary/Keyword: information theory

Search Result 7,300, Processing Time 0.036 seconds

Effect of Information Characteristics of COVID-19 Vaccine on Acceptance Attitude Through Health Belief Theory

  • Lee, Sin-Bok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.20-35
    • /
    • 2022
  • COVID-19 vaccines have been developed worldwide in order to prevent the spread of coronavirus infection-19, but some people tend to refuse to be vaccinated against COVID-19. Therefore, we will investigate how people's understanding of COVID-19 vaccines affects their attitude to accept COVID-19 vaccination information. Therefore, the purpose of this study is to examine the determinants that affect the acceptability of COVID-19 vaccine through the informational characteristics of COVID-19 vaccine and the individual health belief theory. This study conducted an offline survey of 215 adult men and women living in Seoul and Gyeonggi-do Province during the period from September 1 to September 10, 2022, and we have conducted a final analysis using a total of 212 questionnaires. The results of our study were as follows. First, among the information characteristics of COVID-19 vaccine, it was confirmed that the amount of information had a significant positive effect on susceptibility, severity, and barriers in health belief theory, respectively. Second, among the information characteristics of COVID-19 vaccine, it was found that the quality of information had a significant positive effect on the susceptibility in health belief theory. Third, susceptibility and barriers in the health belief theory significantly had a positive effect on voluntary attitude and involuntary attitude in acceptance attitude, respectively. And finally, it was found that the severity of the health belief theory had a positive effect on the involuntary attitude in acceptance attitude. The results of this study suggest that policy efforts are needed to make accurate information about COVID-19 vaccine known to the people.

Personal Information Protection Behavior for Information Quality : Health Psychology Theory Perspectives (정보품질을 위한 개인정보 보호행위: 건강심리이론 관점을 중심으로)

  • Jee, Bum-Suk;Fan, Liu;Lee, Sang-Chul;Suh, Yung-Ho
    • Journal of Korean Society for Quality Management
    • /
    • v.39 no.3
    • /
    • pp.432-443
    • /
    • 2011
  • The purpose of this research is to understand users' information protection behavior on personal information security from health psychology theory perspectives. Empirical results indicate that users' information protection behavior on personal information is predicted by perceived threat and perceived responsiveness. Perceived threat is determined by perceived susceptibility and perceived severity. Perceived responsiveness is determined by response efficacy and self-efficacy, but response cost is not significant. These findings provide an enriched understanding about users' information protection behavior on personal information security.

Application of information theory to wireless cooperative communications (정보이론의 협력무선통신에의 응용)

  • Kim, Yoon-Hyun;Yang, Jae-Soo;Ha, Kwang-Jun;Kim, Jin-Young
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.337-343
    • /
    • 2009
  • Information theory is one field of the applied mathematics quantitating the data in order to store data as many as in the medium or communicate through channel. it was released on the Shannon's paper, in 1948. With basis on this paper, It has been achieved dramatically development for communication, signal processing, and date procedure and transmission in the network In this paper, the basic concept of information theory is described through dealing with contents about meaning of information, entropy, and channel capacity. It is also handled how information theory is applied to the fields of sensor network, relay channel, MIMO system, and others.

  • PDF

A Dialectical Study of the Book Selection Theory (도서선택론의 변증법적 연구)

  • Yun Hee-Yun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.29
    • /
    • pp.173-204
    • /
    • 1995
  • The purpose of this study is to promote understanding of the book selection theory by researching dialectically of its development process centering on the BSTv(value theory) and BSTd(demand theory). The results of this study are summarized as follows 1. In the period of enlightenment and education, the book selection theory of public libraries was the thesis state of BSTv(d). 2. Antithesis state of BSTv(d), that is, BSTd was raised to real central theory of book selection in the early 20th century. 3. In the 1930-40's, BSTv and BSTd were transformed into balance state or coexistence relations(BSTb $[v(d){\cdot}d(v)$]. 4. After World War II, BSTn(library needs theory) and BSTo(library objective theory) were evoked, and opposed to the existing selection theories. Now, they are developing into BSTbl$[n(d)\cdot\;o(v)\;or\;n(d){\cdot}v(o)]$.

  • PDF

Factors Affecting Information Breach Intention: Based on General Deterrence Theory and Rational Choice Theory (정보유출의도에 대한 영향요인: 일반 억제 이론 및 합리적 선택 이론을 기반으로)

  • Kim, June-Young;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1507-1517
    • /
    • 2017
  • Generally, information breach incidents are thought to be caused by external hackers. However, both direct and indirect information breach incidents by insiders are more frequent than by external hackers. It also accounts for more than half of the total information breach, so it should be prepared against insider breach. In this study, based on General Deterrence Theory(GDT) and Rational Choice Theory(RCT), we integrated the risk sensitivity and situational anxiety, which were studied in the field of traffic psychology to construct research model. Result of analysis shows that the impact of risk perceptions on the severity and certainty of perceived punishment was not statistically significant, but perceived benefits, situational anxiety, and severity and certainty of perceived punishment were found to influence the information breach intention.

A Coherent Model in Upholding General Deterrence Theory and Impact to Information Security Management

  • Choi, Myeong-Gil;Ramos, Edwin R.;Kim, Man-Sig;Kim, Jin-Soo;Whang, Jae-Hoon;Kim, Ki-Joo
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.73-86
    • /
    • 2009
  • To establish an effective security strategy, business enterprises need a security benchmarking tool. The strategy helps to lessen an impact and a damage in any threat. This study analyses many aspects of information security management and suggests a way to deal with security investments by considering important factors that affect security manager's decision. To address the different threats resulting from a major cause of accidents inside an enterprise, we investigate an approach that followed ISO17799. We unfold a criminology theory that has designated many measures against the threat as suggested by General Deterrence Theory. The study proposes a coherent model of the theory to improve the security measures especially in handling and protecting company assets and human lives as well.

  • PDF

A Study on the Influence of Information Security Compliance Intention of Employee: Theory of Planned Behavior, Justice Theory, and Motivation Theory Applied (조직원의 정보보안 정책 준수의도에 미치는 영향 연구: 계획된 행동이론, 공정성이론, 동기이론의 적용)

  • Hwang, In-Ho;Hu, Sung-Ho
    • Journal of Digital Convergence
    • /
    • v.16 no.3
    • /
    • pp.225-236
    • /
    • 2018
  • Organizations continue to invest in the security of information technology as a means to be more competitive than others in their industry do. However, there is a relatively lack of interest in the information security compliance of employees who implement information security technologies and policies of organization. This study finds mechanisms for enhancing security compliance by applying theory of planned behavior, justice theory, and motivation theory in information security field. We use structural equation modeling to verify the research hypotheses, and conducted a survey on the employees of organization with information security policy. The results showed that organizational justice, sanction, and organizational identification affect the factors of the planned behavior theory and affect the employee's compliance intention. As a result, this research suggested directions for strategic approach for enhancing employee's compliance intention on organization's security policy.

An Information Theory-based Approach to Modeling the Information Processing of NPP Operators

  • Kim, Jong-Hyun;Seong, Poong-Hyun
    • Nuclear Engineering and Technology
    • /
    • v.34 no.4
    • /
    • pp.301-313
    • /
    • 2002
  • This paper proposes a quantitative approach to modeling the information processing of NPP operators. The aim of this work is to derive the amount of the information processed during a certain control task. The focus will be on i) developing a model for information processing of NPP operators and ii) quantifying the model. To resolve the problems of the previous approaches based on the information theory, i.e. the problems of single channel approaches, we primarily develop the information processing model having multiple stages, which contains information flows. Then the uncertainty of the information is quantified using the Conant’s model, 3 kind of information theory.

A Reflection on Social Perspective of Information Behavior: Around the Theory of Information Worlds (사회적 관점에서의 정보행동 연구에 관한 일 고찰 - 정보세계이론을 중심으로 -)

  • Park, Sungjae
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.1
    • /
    • pp.425-447
    • /
    • 2022
  • The purpose of this study is to introduce the Theory of Information Worlds which analyzes information behaviors in the social perspective. This study analyzed dissertations using the theory to provide the understanding of the theory and suggest theoretical implications. The theory was developed by Burnett and Jeager in 2008, and since then it was applied in 14 dissertations. Key concepts of the theory include social norms, social types, information value, information behavior, and boundaries. These concepts are intervened in the process of creation and control of behavior through interaction each other. Qualitative research was adopted in more research rather than quantitative research; especially interview and content analysis were applied. It is expected that the spectrum of information behavior research in Korea is broaden and deeper through this study.

The Chinese Black Box - A Scientific Model of Traditional Chinese Medicine

  • Theodorou, Matthias;Fleckenstein, Johannes
    • Journal of Acupuncture Research
    • /
    • v.36 no.1
    • /
    • pp.1-11
    • /
    • 2019
  • Models of traditional Chinese medicine (TCM) are still difficult to grasp from the view of a Western-cultural background. For proper integration into science and clinical research, it is vital to think "out of the box" of classical sciences. Modern sciences, such as quantum physics, system theory, and information theory offer new models, that reveal TCM as a method to process information. For this purpose, we apply concepts of information theory to propose a "Chinese black box model," that allows for a non-deterministic, bottom-up approach. Considering a patient as an undeterminable complex system, the process of getting information about an individual in Chinese diagnostics is compared to the input-process-output principle of information theory and quantum physics, which is further illustrated by Wheeler's "surprise 20 questions." In TCM, an observer uses a decision-making algorithm to qualify diagnostic information by the binary polarities of "yang" (latin activity) and "yin" (latin structivity) according to the so called "8 principles" (latin 8 guiding criteria). A systematic reconstruction of ancient Chinese terms and concepts illuminates a scattered scientific method, which is specified in a medical context by Latin terminology of the sinologist Porkert [definitions of the Latin terms are presented in Porkert's appendix [1] (cf. Limitations)].