• Title/Summary/Keyword: risk information

Search Result 6,166, Processing Time 0.024 seconds

Influences of Consumer Perceived Risks and Valence of Word of Mouth Information on Purchase Intention in Social Commerce (소셜 커머스의 소비자 지각된 위험과 구전 방향성이 구매의도에 미치는 영향)

  • Shim, E Seok;Rhee, Hyong Jae
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.73-93
    • /
    • 2013
  • This paper is a research on perceived risk of social commerce which has influence on purchase intention. This study uses a 3-dimension concept of perceived risk and then, deals with influencing a purchase intention. In addition, to search other influential variable to purchase intention, this study adds a variable with expected moderating effect. This study proposes several hypothesis and processes an experiment to test and attest these hypothesis. This study attempts to analyze the effect that perceived risk in social commerce has on purchase intention. By the results of data analysis, all dimensions of perceived risk are found to have significant negative effects on purchase intention. In addition, this study proves moderating roles of valence of WOM Information on purchase intention. Additional managerial implications are also discussed.

The Effect of Risks and Strategic Recognition on the Degree of IT Outsourcing (IS 아웃소싱의 위험과 아웃소싱의 정도에 관한 연구)

  • 문용은;박유진
    • The Journal of Information Systems
    • /
    • v.11 no.1
    • /
    • pp.1-28
    • /
    • 2002
  • Today, IT outsourcing has become a very important management strategy of implementing information systems in organizations. This paper investigates the risks and strategic recognition as a key factors effecting on the degree of outsourcing, Specifically the risks of outsourcing and its four components-control risk, economical risk, technical risk, relational risk-are examined to be a negative effect on the degree of outsourcing. And strategic recognition about outsourcing is examined to be a mediator factor between the risks and the degree of outsourcing. To empirically test these relationships, data are gathered from senior IT managers in 62 corporations. Results of this study show that the degree of outsourcing is strongly influenced by control risk, economical risk, relational risk. But technical risk does not influence on the degree of outsourcing. And strategic recognition about outsourcing is found that is mediator concern with the risks and the degree of outsourcing. The results indicate to provide a good framework to minimize the risks for IT outsourcing success.

  • PDF

A Study on the Perceived Risk of E Commerce and the Pre-Purchase Intention of Internet Shopping Mall Users according to Gender (인터넷 쇼핑몰 이용자의 성별에 따른 구매 이전의 지각된 위험과 구매의도에 관한 연구)

  • Kang, Young-Shin;Chung, Bhum-Suk
    • Management & Information Systems Review
    • /
    • v.23
    • /
    • pp.135-156
    • /
    • 2007
  • The aims of this study are to determine if the perceived risk of e-commerce affect the Internet shopping mall users' decision to pre-purchase an item via e-commerce, to find out if there are differences among the induced perceived risk according to gender, and to verify if the perceived risk according to gender have a correlation to a person's decision to pre-purchase an item via e-commerce. It can thus be concluded that the pre-perceived risk of e-commerce affect the Internet shopping mall users' purchase intention. Different results were obtained, though, according to gender. Moreover, the perceived risk of e-commerce based on gender and the purchase intention of the Internet shopping mall users were shown not to have a correlation. This means that although slightly different study results were presented, e-commerce purchasers can use these results to recognize the risk of e-commerce.

  • PDF

Perceptual Differences between IS Project Service Providers and Customers on Information System Project Risk Factors: a Koran case (정보시스템 프로젝트의 위험요인에 대한 현업인력과 서비스제공인력과의 인식도 차이)

  • Lee, Seog-Jun;Cho, Suk-Jin;Park, Jung-Sun;Hahm, Yu-Keun;Kim, Yong-Jae
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.3
    • /
    • pp.79-94
    • /
    • 2007
  • Cases of botched information systems implementation have been surfaced due to poor IS project management and control. One major source of such failures is the perceptual difference between the participants of IS projects who should define potential risk factors well before considered IS projects are launched. Based on risk factors cited from prior works, this paper empirically examines the risk factors associated with IS service project management to analyze perceptual differences between the IS service providers and customers in Korea. Data analyses found significant differences in the area of scheduling/resource, technological newness, communications, and sponsorship/ownership while statistically significant differences were observed in eleven individual factors out of forty six risk factors. Risk factors are also ordered in terms of perceived importance to highlight the critical differences.

  • PDF

The Effects of COVID-19 Risk Information Seeking and Processing on its Preventive Behaviors and Information Sharing (코로나19 (COVID-19) 관련 위험정보 탐색과 처리가 코로나19 예방 행동 및 정보 공유에 미치는 영향)

  • Park, Minjung;Chai, Sangmi
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.65-81
    • /
    • 2020
  • This study aims to examine the effects of users' perceptions of COVID-19 risk on their seeking and processing of relevant information as COVID-19 emerges and spreads worldwide in 2019. We apply the risk information seeking and processing model (RISP Model) to verify whether users' COVID-19 related information seeking and processing behaviors have a positive effect on their preventive and information sharing behaviors. To achieve this research goal, an online survey was conducted with about 400 of social media users. The users' perceptions of risk for COVID-19 increased their perceived insufficiency of COVID-19 information. In addition, the perceived insufficiency of users' information formed a positive relationship with seeking and searching of information behaviors. The processing of COVID-19 related information has increased related preventive behaviors and sharing of information through social media. While searching for information related to COVID-19 prompted personal information sharing behaviors, it did not significantly affect preventive behaviors. Accordingly, in order to promote COVID-19 preventive behaviors as well as overall user health-related behaviors it can be inferred that additional measures are needed in addition to pursuing relevant information.

Developing the information security risk index using network gathering data (네트워크 수집정보를 이용한 정보보호 위험도 예측지수 개발)

  • Park, Jin Woo;Yun, Seokhoon;Kim, Jinheum;Jeong, Hyeong Chul
    • The Korean Journal of Applied Statistics
    • /
    • v.29 no.7
    • /
    • pp.1173-1183
    • /
    • 2016
  • In this paper, we proposed an information security risk index to diagnose users' malware infection situations (such as computer virus and adware) by gathering data from KT network systems. To develop the information security risk index, we used the analytic hierarchy process methodology and estimated the risk weights of malware code types using the judgments of experts. The control chart could be used effectively to forecast the information security risk for the proposed information security risk index data.

An Effect of Clothing Purchasing Situation on Perceived Risk and Information Search Behavior (의복구매상황에 따른 위험지각과 정보원 활용에 대한 연구 - 자기사용 상황과 선물구매 상황을 중심으로 -)

  • 임경복
    • The Research Journal of the Costume Culture
    • /
    • v.8 no.3
    • /
    • pp.450-459
    • /
    • 2000
  • The purpose of this study was to test the effect of the clothing purchasing situation on the preceived risk and information search behavior. Data were obtained from 369 students who were studying in Semyung University. The results of this study were as follows : 1. Students gave the clothing to their favorites as a gift 1 to 2 times in a year. And they thought self using purchasing was more important than gift giving purchasing. 2. In gift giving purchasing, perceived risks were higher than self using purchasing. But the economic risk was the exception. In that case, students showed more information search behavior except family search source. 3. According to the situation, main and interactive effect of sex and involvement level on perceived risk and information search behavior were significant. In self using purchasing, involvement level had the main effect to the type of information search behavior. But the family search source was the exception Also in gift giving purchasing, they showed the same results. In self using purchasing, main effects of sex and involvement level on perceived risk were significant. Also in gift giving purchasing, they showed the same results, but the socio-psychological risk was the exception.

  • PDF

Development of CC Based Security Risk Analysis Tool (CC(Common Criteria) 기반 보안위험분석 도구 개발)

  • Kim In-Jung;Chung Yoon-Jung;Koh Jae-Young;Won Dong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.31-38
    • /
    • 2006
  • The importance of the Security Risk Analysis has emerged as security breaches and information leaks has occurred in the companies and organization: threats toward information system and its vulnerabilities has grown up as the dependence on the information-communication systems goes higher as a result of technological advances in IT industry, A Risk Analysis Tool helps to mitigate overall risk of an organization by analysing and evaluating critical information systems and providing security measures against threats to systems and its vulnerabilities as a means to identify the inherent dangers and prevent security intrusion incident, This paper defines risk analysis process by introducing Common Criteria Scheme and suggest a risk analysis tool that can be easily implemented by an information security manager.

  • PDF

Disasters Risk Assessment of Urban Areas by Geospatial Information Systems (지형공간정보체계에 의한 도시지역 재해위험도 평가)

  • Yoo, Hwan-Hee;Kim, Seong-Sam;Park, Ki-Youn;Choi, Woo-Suk
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.13 no.3 s.33
    • /
    • pp.41-52
    • /
    • 2005
  • The high density of population and building; can cause catastrophe in urban areas when natural or artificial disasters break out. The aim of this paper is to assess comprehensive disasters risk of urban areas by Geospatial Information System. For this purpose, we classified disasters risk of urban areas into low categories: flood, fire, building-collapse, and shelter, and then determined factors for hazard risk assessment respectively. The results of hazard assessment can be applied to minimize the demage of disasters in establishing the urban management planning. For more systematic and professional approach the further research is need to consider more disaster assessment factors and join with related experts.

  • PDF

The Impact of Information System Control and Audit on the Perceived Risk of the Computer Crime in Case of Financial Institutions (정보시스템통제 및 감사가 컴퓨터범죄의 인지된 위험에 미치는 영향: 금융기관을 중심으로)

  • Han, In-Gu;Yun, Jong-Ho
    • Asia pacific journal of information systems
    • /
    • v.5 no.1
    • /
    • pp.112-128
    • /
    • 1995
  • The information system control includes organizational structure, control mechanism, and management tools which contribute to accomplish the goals of information system: asset safeguarding, data integrity, effectiveness, and efficiency. Information system audit is the process to evaluate whether the information system accomplishs the goals. Information system auditor examine the reliability of information system control and suggest recommendations to improve the information system control. Both information system control and information system audit activities contribute to prevent and detect the computer crime for the organization. This paper proposes a causal model of information system control/audit and the perceived risk of computer crime, and tests the model using a survey on 38 financial institutions in Korea. Statistical results show that information system control and audit significantly reduce the computer crime risk perceived by the user group. The general control has a stronger impact than the application control. In addition, it turns out that the greater the deviation between the importance and the actual level of information system control is, the higher the perceived risk of computer crime is.

  • PDF