• Title/Summary/Keyword: information theory

Search Result 7,300, Processing Time 0.035 seconds

Effect of uncertain information on drivers' decision making (Application of Prospect Theory) (불확실한 정보에 대한 운전자의 의사결정행태 연구)

  • CHO, Hye-Jin;KIM, Kang-Soo
    • Journal of Korean Society of Transportation
    • /
    • v.21 no.1
    • /
    • pp.77-90
    • /
    • 2003
  • This paper explores the way and the extent to which drivers' route choice was influenced by uncertain information. In particular, this paper investigates the effect of qualitative information on route choice when drivers face a choice with different degrees of uncertain information. The SP survey was conducted and route choice legit models were estimated. We also applied Prospect Theory to the analysis of drivers' decision making under uncertain information. The main findings are firstly, drivers tend to prefer a route with information than(to) one without information. This indicated that providing charge information encouraged drivers to choose the routes for which information is provided in preference to those for which it is not provided. Secondly, drivers also prefer a route with a certain and precise information over one with uncertain and imprecise information. Thirdly, when the information is given as a range, the size of the range of the information influenced route choice slightly and as the range of the charge increases, the route becomes slightly less unattractive. Fourthly, when the information is given as a range, drivers' route choices are influenced more by the median value of the ranges than by the size of the overall ranges of the information. Application of Prospect Theory to the results explains the way drivers may be interpreting the choice situation and how they make a route choice in response to uncertain information. The results of this paper implicate that drivers' decision making under uncertainty seem to be very complicated and flexible, depending on the way drivers interpret the choice situation. Therefore, it is recommended to apply wider related theories to the analysis of the drivers' behaviour.

A Study on the Dimension of Quality Metrics for Information Systems Development and Success : An Application of Information Processing Theory

  • An, Joon M.
    • The Journal of Information Technology and Database
    • /
    • v.3 no.2
    • /
    • pp.97-118
    • /
    • 1996
  • Information systems quality engineering is one of the most problematic areas in practice and research, and needs cooperative efforts between practice and theory [Glass, 1996]. A model for evaluating the quality of system development process and ensuing success is proposed based on information processing theory of project unit design. A nomological net among a set of quality variables is identified from prior research in the areas of organization science, software engineering, and management information systems. More specifically, system development success was modelled as a function of project complexity, system development modelling environment, user participation, project unit structure, resource availability, and the level of iterative nature of development methodology. Based on the model developed from the information processing theory of project unit design in organization science. appropriate quality metrics for each variable in the proposed model are matched. In this way, a framework of relevant systems development and success quality metrics for controlling systems development processes and ensuing success is proposed. The causal relationships among the constructs in the proposed model are proposed as future empirical research for academicians and as managerial tools for quality managers. The framework and propositions help quality manager to select more parsimonious quality metrics for controlling information systems development processes and project success in an integrated way. Also this model can be utilized for evaluating software quality assurance programmes, which are developed and marketed by many vendors.

  • PDF

A Study on the Privacy Concern of e-commerce Users: Focused on Information Boundary Theory (전자상거래 이용자의 프라이버시 염려에 관한 연구 : 정보경계이론을 중심으로)

  • Kim, Jong-Ki;Oh, Da-Woon
    • The Journal of Information Systems
    • /
    • v.26 no.2
    • /
    • pp.43-62
    • /
    • 2017
  • Purpose This study provided empirical support for the model that explain the formation of privacy concerns in the perspective of Information Boundary Theory. This study investigated an integrated model suggesting that privacy concerns are formed by the individual's disposition to value privacy, privacy awareness, awareness of privacy policy, and government legislation. The Information Boundary Theory suggests that the boundaries of information space dependends on the individual's personal characteristics and environmental factors of e-commerce. When receiving a request for personal information from e-commerce websites, an individual assesses the risk depending on the risk-control assessment, the perception of intrusion give rise to privacy concerns. Design/methodology/approach This study empirically tested the hypotheses with the data collected in a survey that included the items measuring the constructs in the model. The survey was aimed at university students. and a causal modeling statistical technique(PLS) is used for data analysis in this research. Findings The results of the survey indicated significant relationships among environmental factors of e-commerce websites, individual's personal privacy characteristics and privacy concerns. Both individual's awareness of institutional privacy assurance on e-commerce and the privacy characteristics affect the risk-control assessment towards information disclosure, which becomes an essential components of privacy concerns.

The Pattern Recognition System Using the Fractal Dimension of Chaos Theory

  • Shon, Young-Woo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.2
    • /
    • pp.121-125
    • /
    • 2015
  • In this paper, we propose a method that extracts features from character patterns using the fractal dimension of chaos theory. The input character pattern image is converted into time-series data. Then, using the modified Henon system suggested in this paper, it determines the last features of the character pattern image after calculating the box-counting dimension, natural measure, information bit, and information (fractal) dimension. Finally, character pattern recognition is performed by statistically finding each information bit that shows the minimum difference compared with a normalized character pattern database.

Intentions of Employees to Whistleblow Information Security Policy Violations in the Organization

  • Wei, Liang-Cheng;Hsu, Carol;Wang, Kai
    • Asia pacific journal of information systems
    • /
    • v.26 no.1
    • /
    • pp.163-188
    • /
    • 2016
  • Compliance with information security policies has been an important managerial concern in organizations. Unlike traditional general deterrent theory, this study proposes whistle-blowing as an alternative approach for reducing internal information security policy violations. We build on the theories of planned behavior and rational choice as well as develop a theoretical model to understand the factors that influence whistle-blowing attitudes and intention at both the organizational and individual levels. Our empirical results reveal that altruistic and egoistic concerns are involved in the development of whistle-blowing attitudes. The results not only extend our understanding of whistle-blowing motivation but also offer directions to managers in promoting internal disclosure of information security breaches.

An Empirical Investigation of IT Adoption: Based on Movie Website (정보기술 수용에 관한 실증적 연구 : 영화관 웹사이트를 중심으로)

  • Kim, Jong-Weon;Jeong, Seok-Chan;Kim, Eun-Jung
    • The Journal of Information Systems
    • /
    • v.16 no.4
    • /
    • pp.157-176
    • /
    • 2007
  • Most of the Information Systems(IS) literature has focused on utilitarian or hedonic Information Technology(IT) to explain and predict IT adoption and use. This study investigates the relationships among individuals' beliefs and intention to use of movie website, which has both utilitarian and hedonic characteristics simultaneously. As a theoretical background, this study adopts Technology Acceptance Model(TAM) and Motivation Theory, in which the former is well-known as a theory of IT adoption and use in IS field, and the latter is famous for a theory of individual's behavior in organizational behavior field. With 153 responses, five hypotheses are tested by using structured equation model. The results show that perceived ease of use positively influences perceived usefulness and perceived enjoyment, and that all individuals' beliefs have a positive impact on intention to use of movie web-site. Based upon the study results, movie website's managers and professionals can plan and conduct their courses of action effectively for users' continuous visits on their operating website.

  • PDF

Supplier Evaluation in Green Supply Chain: An Adaptive Weight D-S Theory Model Based on Fuzzy-Rough-Sets-AHP Method

  • Li, Lianhui;Xu, Guanying;Wang, Hongguang
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.655-669
    • /
    • 2019
  • Supplier evaluation is of great significance in green supply chain management. Influenced by factors such as economic globalization, sustainable development, a holistic index framework is difficult to establish in green supply chain. Furthermore, the initial index values of candidate suppliers are often characterized by uncertainty and incompleteness and the index weight is variable. To solve these problems, an index framework is established after comprehensive consideration of the major factors. Then an adaptive weight D-S theory model is put forward, and a fuzzy-rough-sets-AHP method is proposed to solve the adaptive weight in the index framework. The case study and the comparison with TOPSIS show that the adaptive weight D-S theory model in this paper is feasible and effective.

Classification of Rural Villages Using Information Theory (정보이론을 이용한 농촌마을 권역화 연구)

  • Lee, Ji-Min;Lee, Jeong-Jae
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.49 no.1
    • /
    • pp.23-33
    • /
    • 2007
  • Classification results of rural villages provide useful information about rural village characteristics to select similar villages in rural development project; many researches about regional classification have been practiced. Recently rural amenity was introduced as an alternative for rural development, and rural villages have been surveyed to find potential resources for rural development by 'Rural Amenity Resources Survey Project'. Accumulated information through this survey project could be used to classify rural villages. However existing rural classification method using statistical data is not efficient method to use rural amenity resources information described with text. We introduced Information Bottleneck Method (IBM) based on information theory and implemented this method to classification with rural amenity resources information of Yanggang-myen, Yeongdong-gun in Chungbuk province.

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium

  • Liu, Liang;Huang, Cheng;Fang, Yong;Wang, Zhenxue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5260-5275
    • /
    • 2019
  • In the process of constructing the traditional offensive and defensive game theory model, these are some shortages for considering the dynamic change of security risk problem. By analysing the critical indicators of the incomplete information game theory model, incomplete information attack and defense game theory model and the mathematical engineering method for solving Bayes-Nash equilibrium, the risk-averse income function for information assets is summarized as the problem of maximising the return of the equilibrium point. To obtain the functional relationship between the optimal strategy combination of the offense and defense and the information asset security probability and risk probability. At the same time, the offensive and defensive examples are used to visually analyse and demonstrate the incomplete information game and the Harsanyi conversion method. First, the incomplete information game and the Harsanyi conversion problem is discussed through the attack and defense examples and using the game tree. Then the strategy expression of incomplete information static game and the engineering mathematics method of Bayes-Nash equilibrium are given. After that, it focuses on the offensive and defensive game problem of unsafe information network based on risk aversion. The problem of attack and defense is obtained by the issue of maximizing utility, and then the Bayes-Nash equilibrium of offense and defense game is carried out around the security risk of assets. Finally, the application model in network security penetration and defense is analyzed by designing a simulation example of attack and defense penetration. The analysis results show that the constructed income function model is feasible and practical.

A Study on Cutural Capital Influencing Organization Performance

  • Yookyung Kim;Myoenggil Choi
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.6
    • /
    • pp.95-122
    • /
    • 2022
  • The rapid development of technology, the spread of information, and the implementation of the government's start-up support policy exponentially increase the number of start-up companies. The purpose of this study is to investigate each company's cultural capital's effect on organization performance by promoting knowledge management activities and forming organization habitus based on Cultural Reproduction Theory and Cultural Mobility Theory. As a result of the study, it confirmed that the relationship between cultural capital, knowledge management activities, habitus, and organization performance was significant. The results of this study have academic implications as follows: First, the field of research has expanded by studying the effects of cultural capital on business administration, which is less active than existing education and sociology. Second, it accepts and supports Cultural Reproduction Theory and Cultural Mobility Theory from different perspectives.