With the development of Internet and popularization of smartphones over recent years, social network services are experiencing rapid growth. On top of this, smartphone gaming market is showing a rapid growth and the use of mobile social games is on the significant rise. The occurrence of game data manipulation targeting these services and personal information leakage is highlighting the importance of social gaming security. This study is intended to propose development plans effective and efficient in social game services by figuring out factors putting effects on security dependent behavior of social game users in Korea and carrying out a practical study on the casual relationship between factors influencing security dependent behavior through recognized behavioral control and attitudes for privacy infringement of these factors. To do this, proposed was a study model in which the HBM(Health Belief Model) allowing the social game user to influence security dependent behavior was expanded and applied as a major variable. To verify the study model of this study practically, a survey was conducted among university students in Seoul-based K University and S University who had experienced using social game services. According to the study findings, firstly, the perceived seriousness turned out to provide positive influence to trust. But, the perceived seriousness turned out not to put positive effects on self-efficacy. Secondly, the perceived probability turned out not to put positive effects on self-efficacy and trust. Thirdly, the perceived gain turned out to put positive effects on self-efficacy and trust. Fourthly, the perceived disorder turned out not to put positive effects on self-efficacy and trust. Fifthly, self-efficacy turned out to put positive effects on trust. But, self-efficacy turned out not to put positive effects on security dependent behavior. Sixthly, trust turned out not to put positive effects on security dependent behavior. This study is intended to make a strategic proposal so that social game users can raise awareness of their level of security perception and security willingness through this.
Mobile technologies and services have become one of the inevitable parts of people's lives and mobile businesses have also been widespread. Popular mobile internet services through cell phones have made people in the financial industry consider that 'mobile' is promising. Nevertheless, there have been little studies of mobile services in the financial industry and most of the studies have been concentrated on internet services. The main purpose of this study is to investigate on the determinants of intention to use mobile banking. To achieve the goal, based on the theoretical backgrounds of the Technology Acceptance Model(TAM). Survey questionnaires were distributed via post & email to 500 users who have been experiences with cell phone and have an account. Out of 291 responded questionnaires, 275 data sets were available for statistical analysis with SPSS 10.1. Research hypotheses are analyzed by LISREL 8.30. Factor analysis identified seven external factors : (1) convenience, (2) cost, (3) unusefulness, (4) riskiness, (5) personal innovativeness (6) users' self-efficacy (7) experience of mobile services. Results of this study show that convenience, unusefulness, riskiness, personal innovativeness and experience of mobile services have significant effects on intention to use mobile banking . Much of the previous researches have dealt with service provider only and have focused on mobile internet. In this regard, when it comes to a viewpoint that regards the mobile banking sector as a new sector of mobile businesses. This study may provide a guideline to activate of mobile banking acceptance.
Journal of Information Technology Applications and Management
/
v.25
no.2
/
pp.23-40
/
2018
In order to reduce the spread of illegal digital contents, many studies have been focusing on how to stop it through laws and regulations. Only few of the studies tried to explain the illegal behaviors from individual's viewpoints. This paper aims to examine the intention of sharing illegal digital contents over the Internet and proposes a theoretical model based on the Theory of Planned Behavior (TPB) along with the introduction of two outcome expectations. We also argue that the individuals' cognition of online copyright will influence individuals' illegal contents sharing on the Internet. We have collected data from online survey and offline interview. By empirical study, the results support the theoretical model except the subjective norm which has no effect on individuals' behavior. This is a different finding from the previous researches revealing that the subjective norm has no effect on individuals' unethical actions. Overall, the findings provide strong confirmation that attitude, self-efficacy and outcome expectations impact on individual's intention of sharing illegal contents. In addition, this study proposed an improved cognition of online copyright through education and standard of new media management will reduce illegal contents sharing on Internet.
Short videos are becoming more popular in mobile Internet age. Not only people's media consumption patterns have been changed by the rise of this new media form, but also it has posed challenges to public psychological well-being. For many netizens, their entertainment needs have been met by watching short videos. However, many side effects, such as addiction and anxiety, reduce users' subjective well-being instead of satisfying the entertainment motivation after watching short videos. Therefore, it has become a significant research problem in short videos to figure out how to get audiences to watch short videos on a regular basis while avoiding side effects like anxiety and addiction and improving audiences' subjective well-being. Based on the theory of Internet addiction, this study analyzed short video users using the 2×2×2 research method and explored the relationship between the length of use, addiction, anxiety, and subjective well-being of short video users. The results showed that short video users with different usage lengths showed significant differences in addiction, anxiety, subjective well-being, and online social support; innovative different short video users showed significant differences in addiction and anxiety, as well as a triadic relational interaction of short video users' anxiety under the interaction with self-efficacy and online social support. This study contributes to the advancement of internet addiction theory research and application, assisting short video users in avoiding addiction and anxiety, and improving the subjective well-being of short video users, thereby promoting the growth of the short video industry.
Journal of Korea Society of Industrial Information Systems
/
v.24
no.4
/
pp.79-98
/
2019
In this paper, the security behaviors and attitudes related with the personal information of teenagers were investigated using empirical data based on rational behavior theory and protection motivation theory. An experiment for teenagers was conducted on Excel and the statistical packages (i.e., SPSS 21.0 and SmartPLS2.0.M3) to see how self-efficiency, security attitude, security intention and individual innovation affect their security behaviors. The experimental results showed that the security behaviors and attitudes of teenagers between internet and information devices are closely related, and the social influences can affect personal self-efficacy and security attitudes. Finally, we can know that teenagers should recognize the importance of security and protect their personal information safely through continuous education and training so that they can be linked to security behaviors.
We have information through a variety of media such as language, pictures and internet. Since we get information through texts mostly, we can say that reading ability which enables a person to read a text and understand its meaning basically is the most essential for people to possess. Taking the advantage of the fact that a school is a place where learning and daily-life guidance can be made at the same time, we need to try encouraging students to involve in learning process and feel a sense of accomplishment by adding consultation between a teacher and a student or between a student and a student in Korean subject. This study selected two fifth grade classes of an elementary school of small and medium-sized city as an experimental group and a control group respectively and applied reading strategy program by using interaction of complementary lesson as the number of ten times during five weeks. It focused on making students interested in complementary class and encouraging them to become active participants. This study's goal is to see if the reading strategy program affects students' reading comprehension, metacognition and a sense of self-efficacy The results of the study are as in the following: first, the reading strategy program of complementary lesson is effective in students' reading comprehension and a range of factual understanding and sentimental understanding. Second, the reading strategy program of complementary lesson is effective in adjustment area as a subordinate factor of metacognition. Third, the reading strategy program of complementary lessonis effective in students' sense of self-efficacy. It is shown that experience of using new reading strategy and successful experience and help in peer-group members have a positive effects on a student's sense of self-efficacy. Forth, as the result of satisfaction evaluation over the program with the students' activity report and researchers' observation results, the study shows that the organization and operation of the program influences on students' effort and participation to reach the goal together positively. Through the results as above, we can say that the reading strategy program of complementary lesson have a positive effect on a student's reading comprehension, metacognition and a sense of self-efficacy.
Journal of the Korean Institute of Intelligent Systems
/
v.11
no.4
/
pp.320-324
/
2001
According to the rapid growth of computer and internet recently, A hacking to steal infonnations and the computer vinls to destroy the data in computer are now prevailing in the whole world. A study of methods to protect the data of computer is in progress. One of the study is constmction of computer immune system using biological immune system tbat has ability of removal and protection from extemal invasion. In this paper, we make a change detection algorithm which is based on ability of distinction between self and nonself in T-cytotoxic cell that is one of biological immune cell. In algorithm, MHC receptors are composed of a part of self-file that is recognized as itself and those shall distinguish self-file from the changed file. As a result of applying this algorithm to the changed self-files, we prove the efficacy of detection of the self-files changed by computer virus and hacking.
The importance of information security is increasing, and various efforts are being made to improve users' information security behaviors. Among these various efforts, information security education is mainly aimed at providing users with information security knowledge and improving information security awareness. This study classified the types of information security education into offline and online to examine the effects of each education method on attitudes toward information security (perceived severity, vulnerability, self-efficacy and response-efficacy) and information security behaviors. A survey was conducted for users with information security education experiences. The results obtained by comparing the differences in the path coefficients of personal information security behaviors according to information security education experiences showed that security behaviors were more significant in the online experience group than the offline group. In addition, gender differences were analyzed, and it was found that females had a greater impact on information security attitudes than males. This study also found that among Internet users with online information security education experience, females tend to have more information security behavior than males, but there were contrasting results among users with offline information security education experiences. The results of this study finally address the necessity of reflecting users' personalities in the systematic design of information security education in the future. Furthermore, the results of this study support the need for an appropriate education system that sufficiently understands education types to maximize the effects of information security education.
With the advent of communication technologies including electronic collaborative tools and conferencing systems provided over the Internet, virtual collaboration is becoming increasingly common in organizations. Virtual collaboration refers to an environment in which the people working together are interdependent in their tasks, share responsibility for outcomes, are geographically dispersed, and rely on mediated rather than face-to face, communication to produce an outcome. Research suggests that new sets of individual skill, knowledge, and ability (SKAs) are required to perform effectively in today's virtualized workplace, which is labeled as individual virtual competence. It is also argued that use of online social networking sites may influence not only individuals' daily lives but also their capability to manage their work-related relationships in organizations, which in turn leads to better performance. The existing research regarding (1) the relationship between virtual competence and task performance and (2) the relationship between online networking and task performance has been conducted based on different theoretical perspectives so that little is known about how online social networking and virtual competence interplay to predict individuals' task performance. To fill this gap, this study raises the following research questions: (1) What is the individual virtual competence required for better adjustment to the virtual collaboration environment? (2) How does online networking via diverse social network service sites influence individuals' task performance in organizations? (3) How do the joint effects of individual virtual competence and online networking influence task performance? To address these research questions, we first draw on the prior literature and derive four dimensions of individual virtual competence that are related with an individual's self-concept, knowledge and ability. Computer self-efficacy is defined as the extent to which an individual beliefs in his or her ability to use computer technology broadly. Remotework self-efficacy is defined as the extent to which an individual beliefs in his or her ability to work and perform joint tasks with others in virtual settings. Virtual media skill is defined as the degree of confidence of individuals to function in their work role without face-to-face interactions. Virtual social skill is an individual's skill level in using technologies to communicate in virtual settings to their full potential. It should be noted that the concept of virtual social skill is different from the self-efficacy and captures an individual's cognition-based ability to build social relationships with others in virtual settings. Next, we discuss how online networking influences both individual virtual competence and task performance based on the social network theory and the social learning theory. We argue that online networking may enhance individuals' capability in expanding their social networks with low costs. We also argue that online networking may enable individuals to learn the necessary skills regarding how they use technological functions, communicate with others, and share information and make social relations using the technical functions provided by electronic media, consequently increasing individual virtual competence. To examine the relationships among online networking, virtual competence, and task performance, we developed research models (the mediation, interaction, and additive models, respectively) by integrating the social network theory and the social learning theory. Using data from 112 employees of a virtualized company, we tested the proposed research models. The results of analysis partly support the mediation model in that online social networking positively influences individuals' computer self-efficacy, virtual social skill, and virtual media skill, which are key predictors of individuals' task performance. Furthermore, the results of the analysis partly support the interaction model in that the level of remotework self-efficacy moderates the relationship between online social networking and task performance. The results paint a picture of people adjusting to virtual collaboration that constrains and enables their task performance. This study contributes to research and practice. First, we suggest a shift of research focus to the individual level when examining virtual phenomena and theorize that online social networking can enhance individual virtual competence in some aspects. Second, we replicate and advance the prior competence literature by linking each component of virtual competence and objective task performance. The results of this study provide useful insights into how human resource responsibilities assess employees' weakness and strength when they organize virtualized groups or projects. Furthermore, it provides managers with insights into the kinds of development or training programs that they can engage in with their employees to advance their ability to undertake virtual work.
Objective: The purpose of this study was to identify the practitioner and organizational characteristics that either detracted from or encouraged the use of evidence-based practice (EBP) by physical therapists. Design: A cross-sectional survey study Methods: Participants were 260 physical therapists currently practicing in South Korea. They completed a questionnaire designed to determine attitudes, beliefs, interest, self-efficacy and barriers to EBP, as well as demographic information about themselves and their practice settings. Logistic regression was used to examine relationships between socio-demographic and work environment characteristics and each practitioner factor. Results: Respondents agreed that the use of evidence in practice was necessary. Although 80% of them agreed that research findings are useful, 71% felt that a divide exists between research and practice. In terms of confidence in their skills, the ability to interpret results of statistical procedures ranked lowest. Despite internet access at work for 63% of respondents, only 14% were given protected work time to search and appraise the literature. Only 2% of respondents stated that their organization had a written requirement to use current evidence in their practice. The primary barrier to implementing EBP was a reported lack of time. Conclusions: In conclusion, most physical therapists stated they had a positive attitude toward EBP and were interested in learning or improving the skills necessary for implementation. Most recognized a need to increase the use of evidence in their daily practice, but a lack of ability to understand the results of research represents a significant barrier to implementing EBP.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.