• Title/Summary/Keyword: information users

Search Result 14,274, Processing Time 0.049 seconds

Information Suppression and Projection Strategies Depending on Personality Traits: Using Social media for Impression Management (사용자의 성격에 따른 정보의 통제와 투사 전략: 인상관리를 위한 소셜미디어의 활용)

  • Yun, Haejung;Lee, Hanbyeol;Lee, Choong C.
    • Knowledge Management Research
    • /
    • v.18 no.3
    • /
    • pp.147-162
    • /
    • 2017
  • As social media started to work as important communication tools, social media users have tried to manage their image, identity, and impression through social media. Social media service providers have been interested in providing various functions effectively disclosing users' emotion, such as posting, commenting, and sharing content; on the other hand, relatively few efforts have been made to provide social media functions for information suppression. In this study, therefore, we attempt to examine the relationship between Facebook users' personality and impression management behaviors. Personal traits of users including public self-consciousness, positive self-expression, and honest self-expression were considered as independent variables. Impression management behaviors are composed of two variables, which are suppression and projection. The survey was conducted, targeting 230 Facebook users. The research findings show that public self-consciousness and positive self-expression are positively associated with information suppression while both positive and honest self-expression is positively associated with information projection.

Design and Implementation of RSS feed search engine for Effective Contents Service (효과적인 콘텐츠 서비스를 위한 RSS피드 검색 엔진의 설계 및 구현)

  • Lee, Hae sung;Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.1
    • /
    • pp.1-8
    • /
    • 2008
  • In the Web 2.0, besides more gaining information on the web, the number of web sites that take advantage of RSS increases explosively. Commonly each users search RSS channels through the web search engine before registering RSS channel's url to the RSS reader. Users judge whether the site is RSS channel or not and register an RSS channel's url through theirs interests. Because accomplished by users themselves, those processes conflict to user's convenience and quick consumption of information. Techniques of current search engines can't provide users with reliable RSS feed information as search results. In this paper, we analysis appropriateness of current search engines' techniques that offer users RSS feed search service and discuss their limitations. Also, we make up RSS feed database through classification of RSS tag being possible to search RSS feed information effectively and apply update rate of each RSS channel's feed to ranking algorithm providing more reliable search results.

Marketer-Generated Content Sharing Among Social Broadcasting Users: Effects of Intrinsic Motivations, Social Capital and the Moderating Role of Prevention Focus

  • Li, Yuhao;Wang, Kanliang
    • Asia pacific journal of information systems
    • /
    • v.25 no.4
    • /
    • pp.719-745
    • /
    • 2015
  • Social networking services provide individuals with an easy approach for exchanging messages with others based on interpersonal relationships. However, why individuals spread marketer-generated content (MGC) in their online social circles remains unclear. Therefore, we develop a theoretical model to examine how social capital, intrinsic motivations, personal perceptions, past behavior, and personal traits influence MGC sharing behavior of social media users in micro-blogging context. Data collected from 319 social networking users support the proposed model. The results from partial least squares analyses show that enjoyment, perceived control, and outcome expectations are significant indicators of individual's MGC sharing intention in the social broadcasting environment. Results also suggest that social capital, users' intention, and past behavior positively influence the MGC sharing behavior of users. Moreover, individual prevention pride exhibits a significant interaction effect on the relationships between users' MGC sharing and its antecedents. Implications for research and practice are discussed.

A Multi-Agent MicroBlog Behavior based User Preference Profile Construction Approach

  • Kim, Jee-Hyun;Cho, Young-Im
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.1
    • /
    • pp.29-37
    • /
    • 2015
  • Nowadays, the user-centric application based web 2.0 has replaced the web 1.0. The users gain and provide information by interactive network applications. As a result, traditional approaches that only extract and analyze users' local document operating behavior and network browsing behavior to build the users' preference profile cannot fully reflect their interests. Therefore this paper proposed a preference analysis and indicating approach based on the users' communication information from MicroBlog, such as reading, forwarding and @ behavior, and using the improved PersonalRank method to analyze the importance of a user to other users in the network and based on the users' communication behavior to update the weight of the items in the user preference. Simulation result shows that our proposed method outperforms the ontology model, TREC model, and the category model in terms of 11SPR value.

A Study on the Information-Seeking Behavior of ST Information Users of the KISTI (KISTI 과학.기술정보 이용자의 정보추구행태 연구)

  • Yoon, Cheong-Ok
    • Journal of Information Management
    • /
    • v.32 no.2
    • /
    • pp.1-25
    • /
    • 2001
  • The purpose of this study Is to analyze and describe the characteristics of the information needs and information seeking behavior of ST information users of the KISTI. Questionnaires were distributed to the ST information users in the academic, industrial, and scientific sectors via mail. The role of the KISTI as the specialized information source and intermediary for other institutional information sources as well as individual users and the need for improving the strategies for customer-based services and collection development were evaluated. Major findings include the need for a more comprehensive effort to collect, preserve, and communicate the ST information resources. the need for much broader collection of journals and conference proceedings to provide the documents "on demand" for users, and the need to improve DDS in general.

  • PDF

Understanding information users through user segmentation using factor analysis and cluster analysis (요인 분석과 클러스터 분석 기법을 활용한 사용자 세분화를 통한 정보이용자 이해)

  • Park, Minsoo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.437-442
    • /
    • 2020
  • Since the advent of the innovative information technology called the Internet, the dynamism of the information environment has brought about changes in information users' needs and behavior. It is essential to understand information users in this rapidly changing environment, and based on this, it is necessary to effectively build and operate an information service and a system therefor. The purpose of this study is to understand the characteristics according to the segmentation of users of the National Science and Technology Information Service System, and to derive improvements to customized services and content development through research and analysis of content usage. A total of 816 science and technology information service system users participated in online surveys from September to November. Collected data is applied to factor analysis and cluster analysis techniques to subdivide users of science and technology information service systems, to recognize new information technologies and information services, science technology information needs, and science and technology attributes that users consider important. We derived the results according to the segmented user group.

A Study on Use Intention and Satisfaction of Mobile Transportation Information Applications (모바일 교통정보 애플리케이션의 사용의도와 만족도에 관한 연구)

  • Lee, Chang Hee;Kim, Myung Soo;Kum, Ki Jung
    • International Journal of Highway Engineering
    • /
    • v.15 no.5
    • /
    • pp.167-176
    • /
    • 2013
  • PURPOSES : Lately, a traffic information market has been developed with a rapid speed owing to information and communications. In this situation, a study on the use intention and the satisfaction of mobile transportation information applications of users will be diverse implications and a strategic foundation to local governments and transportation information related enterprises that should provide satisfactory info as public goods to much more users. METHODS : Going along with the flow, this study establishes features of the mobile transportation information applications aiming to the users and analyzes empirical causality for effects of the use intension and the satisfaction. Through this study's analysis, targeting users having experienced transportation information applications among smart phone users, a survey was conducted and characteristics of the transportation information applications were lighted and the effects of the use intention and the satisfaction were analyzed using a technology acceptance model. RESULTS : The analysis result was that Accuracy, Riskiness, Ubiquity and Interactivity as all attributes of transportation information applications have a significant effect on Perceived usefulness and Perceived Ease of Use respectively. The Perceived usefulness and Perceived Ease of Use have affected significantly users' satisfaction respectively, so consequentially this shows effect relationship leading to reuse intention. CONCLUSIONS : The Perceived usefulness and Perceived Ease of Use all for the transportation information applications were shown to influence significantly on the satisfaction. With this kind of result, if users obtain positive outcomes such as travel time reduction or effective roles on their tasks through the transportation information applications, they feel the satisfaction for using and eventually these affect positively to the reuse intention of those transportation information applications.

A Study on the Factors Affecting the Information Systems Security Effectiveness of Password (패스워드의 정보시스템 보안효과에 영향을 미치는 요인에 관한 연구)

  • Kim, Jong-Ki;Kang, Da-Yeon
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.1-26
    • /
    • 2008
  • Rapid progress of information technology and widespread use of the personal computers have brought various conveniences in our life. But this also provoked a series of problems such as hacking, malicious programs, illegal exposure of personal information etc. Information security threats are becoming more and more serious due to enhanced connectivity of information systems. Nevertheless, users are not much aware of the severity of the problems. Using appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. The purpose of this research is to empirically analyze a research model which includes a series of factors influencing the effectiveness of passwords. The research model incorporates the concept of risk based on information systems risk analysis framework as the core element affecting the selection of passwords by users. The perceived risk is a main factor that influences user's attitude on password security, security awareness, and intention of security behavior. To validate the research model this study relied on questionnaire survey targeted on evening class MBA students. The data was analyzed by AMOS 7.0 which is one of popular tools based on covariance-based structural equation modeling. According to the results of this study, while threat is not related to the risk, information assets and vulnerability are related to the user's awareness of risk. The relationships between the risk, users security awareness, password selection and security effectiveness are all significant. Password exposure may lead to intrusion by hackers, data exposure and destruction. The insignificant relationship between security threat and perceived risk can be explained by user's indetermination of risk exposed due to weak passwords. In other words, information systems users do not consider password exposure as a severe security threat as well as indirect loss caused by inappropriate password. Another plausible explanation is that severity of threat perceived by users may be influenced by individual difference of risk propensity. This study confirms that security vulnerability is positively related to security risk which in turn increases risk of information loss. As the security risk increases so does user's security awareness. Security policies also have positive impact on security awareness. Higher security awareness leads to selection of safer passwords. If users are aware of responsibility of security problems and how to respond to password exposure and to solve security problems of computers, users choose better passwords. All these antecedents influence the effectiveness of passwords. Several implications can be derived from this study. First, this study empirically investigated the effect of user's security awareness on security effectiveness from a point of view based on good password selection practice. Second, information security risk analysis framework is used as a core element of the research model in this study. Risk analysis framework has been used very widely in practice, but very few studies incorporated the framework in the research model and empirically investigated. Third, the research model proposed in this study also focuses on impact of security awareness of information systems users on effectiveness of password from cognitive aspect of information systems users.

An Integrated Game Theoretical Approach for Primary and Secondary Users Spectrum Sharing in Cognitive Radio Networks

  • Kim, Jong-Gyu;Nguyen, Khanh-Huy;Lee, Jung-Tae;Hwang, Won-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.12
    • /
    • pp.1549-1558
    • /
    • 2011
  • In this paper, we address the problem of bandwidth sharing among multiple primary users and multiple secondary users in a cognitive radio network. In cognitive radio networks, effective spectrum assignment for primary and secondary users is a challenge due to the available broad range of radio frequency spectrum as well as the requisition of harmonious coexistence of both users. To handle this problem, firstly, Bertrand game model is used to analyze a spectrum pricing in which multiple primary users emulate with each other to acquire maximal profit. After that, we employ Cournot game to model the spectrum sharing of secondary users to obtain optimal profit for each user also. Simulation results show that our scheme obtains optimal solution at Nash equilibrium.

An E-Mail Recommendation System using Semi-Automatic Method (반자동 방식을 이용한 이메일 추천 시스템)

  • Jeong, Ok-Ran;Jo, Dong-Seop
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.604-607
    • /
    • 2003
  • Most recommendation systems recommend the products or other information satisfying preferences of users on the basis of the users' previous profile information and other information related to product searches and purchase of users visiting web sites. This study aims to apply these application categories to e-mail more necessary to users. The E-Mail System has the strong personality so that there will be some problems even if e-mails are automatically classified by category through the learning on the basis of the personal rules. In consideration with this aspect, we need the semi-automatic system enabling both automatic classification and recommendation method to enhance the satisfaction of users. Accordingly, this paper uses two approaches as the solution against the misclassification that the users consider as the accuracy of classification itself using the dynamic threshold in Bayesian Learning Algorithm and the second one is the methodological approach using the recommendation agent enabling the users to make the final decision.

  • PDF