• Title/Summary/Keyword: user intention

Search Result 1,183, Processing Time 0.023 seconds

Group Behavior Pattern Analysis with respect to Playing Loyalty among Blade & Sole Game Users (충성도에 따른 블레이드 앤 소울 게임의 사용자 그룹 행동 패턴 분석)

  • Chung, Ji-in;Song, Doo Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1340-1346
    • /
    • 2018
  • There have been researches on game continuance intention based on consumer behaviour theory of management science. Such macro access of computer game analysis might be insufficient to draw valuable results due to complex subsystem structure of recent computer games. In this paper, we choose 'Blade and Soul' game that was first published in 2012 and has been within top 20 MMORPG in Korea but known as a 'long time users' only game'among game players recently. Three user groups - long loyalty, concentrated, casual - are classified based on their play history and play time per day of Blade and Soul. The first survey with 222 subjects revealed that the real strength of the game was not the combat - Dungeon, Arena, Battleground competition - but very cohesive game community Blade and Soul has. Thus, we conduct another survey on the game community issues among 148 long time users (over 3 years playing history) and analyze their traits and behaviour patterns.

A study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory (인터넷상에서의 개인정보 보호행동에 관한 연구: 보호동기이론을 중심으로)

  • Park, Chanouk;Lee, Sang-Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.59-71
    • /
    • 2014
  • This study applied customer perspective to find out ways how to protect customers' privacy by themselves. It does so by examining the factors which affect customer privacy protection behaviors. Based on the Privacy Act, this study developed the construct of Privacy Rights awareness and finds the law's effect on privacy awareness and behavioral change. The study finds that there exists a significant difference in privacy protection behavior according to privacy rights awareness. Independent variables are as follows: Five variables (Perceived vulnerability, Perceived severity, Perceived response effectiveness, Perceived barriers, Privacy Rights awareness) were tested as critical variables influencing Behavioral Intention in PMT model. Privacy awareness had a moderating effect on the relationship between perceived severity and privacy protection behavior. This study would contribute on theoretical expansion of Protection Motivation Theory and also provide practical implications for effective ways to promote behavioral changes.

Factors Affecting the Behavior of Sharing Online Video : Focusing on Need to Belong, Personal Growth Initiative, and Theory of Planned Behavior (온라인 비디오 공유 행위에 영향을 미치는 요인: 소속 욕구, 자기성장주도성, 계획된 행동이론 모델을 중심으로)

  • Yu, Su-Min;Noh, Ghee-Young
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.213-223
    • /
    • 2019
  • This study aims to prove the relationship between a TPB(theory of planned behavior) variables (subjective norms, attitudes, and self-efficacy), need to belong and personal growth initiatives to explain the reasons for users' shared behavior. 959 participants who had shared online video were collected as a sample through an online survey and the collected data were analyzed through structural equation modeling. The study found that need to belong affected attitudes to online video sharing and subjective norms, and that personal growth initiative also affected attitudes to online video sharing and self-efficacy. In addition, all three variables of TPB were affect the intend of online video sharing, and attitudes to online video sharing were affecting subjective norms and self-efficacy. This study is meaningful in that it demonstrated the user's intention to share online video through variables of TPB along with their need to belong and personal growth initiatives.

Antecedents of Users' Intentions to Give Personal Identification Information and Privacy-Related Information in Social Media (소셜 미디어에서 개인 식별 정보와 사생활 정보 공유 의지에 영향을 미치는 요인)

  • Kim, Byoungsoo;Kim, Daekil
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.127-136
    • /
    • 2019
  • In the social media, information that users share with service providers can be divided into personal identification information such as gender and age and privacy-related information such as photos and comments. However, previous works on IS and service management have shed relatively little light on the difference of information-sharing decisions depending on the type of information. This study examines information-sharing decisions by separating the two types of information. A structural equation modeling method is used to test the research model based on a sample of 350 Facebook in South Korea. Analysis results show that self-expression, trust, and perceived security had a significant positive effect on both user's intentions to give personal identification information and their intentions to give privacy-related information. However, privacy concerns negatively affected their intentions to give personal identification and intention to give privacy-related information. The analysis results confirm that there was no difference between decision-making processes about sharing personal identification information and ones about sharing privacy-related information.

Examining the PMIS Impacts on the Project Performance, User Satisfaction and Reuse Intention among the Project based Industries (프로젝트 성과, 사용자 만족도 및 재사용의도에 미치는 PMIS의 산업별 영향 비교)

  • Park, So-Hyun;Lee, Ayeon;Kim, Seung-Chul
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.3
    • /
    • pp.276-287
    • /
    • 2021
  • Project Management Information System (PMIS) is a special purpose information system that is created to provide useful information for project managers and participants to make effective and efficient decision making during projects. The use of PMIS is increasing in project based industries such as construction, defense, manufacturing, software development, telecommunication, etc. It is generally known that PMIS helps to improve the quality of decision making in project management, and consequently improves the project management performance. However, it is unclear what are the difference of PMIS impacts between industries, and still need to be studied further. The purpose of this study is to compare the impact of PMIS on project management performance between industries. We assume that the effects of PMIS will be different depending on the industry types. Five hypotheses are established and tested by using statistical methods. Data were collected by using a survey questionnaire from those people who had experience of using PMIS in various project related industries such as construction, defense, manufacturing, software development and telecommunication. The survey questionnaire consists of 5 point scale items and were distributed through e-mails and google drive network. A total of 181 responses were collected, and 137 were used for analysis after excluding those responses with missing items. Statistical techniques such as factor analysis and multiple regression are used to analyze the data. Summarizing the results, it is found that the impacts of PMIS quality on the PM performance are different depending on the industry types where PMIS is used. System quality seems to be more important for improving the PM performance in construction industry while information quality seems more important for manufacturing industry. As for the ICT and R&D industries, PMIS seems to have relatively lesser impact compared to construction and manufacturing industries.

A Study on Parking User's Perception for Vitalizing the Shared Parking in Residential Priority Parking Areas (거주자우선주차구역내 공유주차 활성화를 위한 이용자 의식 분석 연구)

  • Kim, Hee Sun;Oh, Seung Hoon;Kang, Tae Euk
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.39 no.1
    • /
    • pp.45-53
    • /
    • 2019
  • As the urbanization progresses, the demand for parking in large cities surges compared with that for parking lots. However, the space for securing a parking lot in a large city is physically limited and a budget problem also arises. Therefore, a shared parking system that can utilize existing parking lots is becoming important. This study was carried out to analyze the parking area efficiently for the residents parking area. As a result of the questionnaire survey, it was the most frequent passage to work / commuting and business purposes. The most important factors in parking were 'Parking charge', 'Walking distance to the destination after parking', 'Parking lot searching time' Approximately 46 % of the respondents were female. As a result of the quantitative analysis of the factors influencing the potential use of the intention to use as a dependent variable, it was analyzed that the policy was effective to reduce the parking fee to less than 500 won per 10 minutes and take about 3-6 minutes to search.

Meta-Analysis of Information Privacy Using TSSEM (TSSEM을 이용한 정보 프라이버시 메타분석)

  • Kim, Jongki
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.149-156
    • /
    • 2019
  • With widespread use of information technologies, information privacy issues have been gaining more attention by not only the public but also researchers. The number of studies on the issues has been increasing exponentially, which makes incomprehensible the whole picture of research outcome. Thus, it is necessary to conduct a systematic examination of past research. This study developed two competing models with four essential constructs in information privacy research and empirically tested the models with data obtained from previous studies. This study employed a quantitative meta-analysis method called TSSEM. It is one of MASEM methods in which structural equation modeling and meta-analysis are integrated. The analysis results indicated that risk-centric model exhibited much better model fits than those of concern-centric model. This study implies that traditional concern-centric model should be questioned it's explanatory power of the model and researchers may consider alternative risk-centric model to explain user's intention to provide privacy information.

Practical Secure E-mail Protocols Providing Perfect Forward Secrecy (완전한 전방향 안전성을 제공하는 실용적인 전자우편 프로토콜)

  • Lee, Chang-Yong;Kim, Dae-Young;Shim, Dong-Ho;Kim, Sang-Jin;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.27-38
    • /
    • 2007
  • One of the most important security issues of e-mail service is user privacy. Currently, various security protocols, like PGP(pretty Good Privacy), S/MIME(Secure/Multipurpose Internet Mail Extension), have been proposed. These protocols, however, do not provide forward secrecy. Recently, some security protocols that provide forward secrecy were proposed. But all of them require changes to the current e-mail infrastructure. Moreover, contrary to authors' intention, some of them do not actually provide perfect forward secrecy. In this paper, we propose a new practical e-mail security protocol. The proposed protocol provides perfect forward secrecy and uses a practical e-mail model that dose not require any changes to existing e-mail servers. It encrypts and authenticates messages efficiently using elliptic curve based signcryption scheme. In addition, we provide a way to send secure group e-mails.

Design and Implementation of Interactive Search Service based on Deep Learning and Morpheme Analysis in NTIS System (NTIS 시스템에서 딥러닝과 형태소 분석 기반의 대화형 검색 서비스 설계 및 구현)

  • Lee, Jong-Won;Kim, Tae-Hyun;Choi, Kwang-Nam
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.9-14
    • /
    • 2020
  • Currently, NTIS (National Technology Information Service) is building an interactive search service based on artificial intelligence technology. In order to understand users' search intentions and provide R&D information, an interactive search service is built based on deep learning models and morpheme analyzers. The deep learning model learns based on the log data loaded when using NTIS and interactive search services and understands the user's search intention. And it provides task information through step-by-step search. Understanding the search intent makes exception handling easier, and step-by-step search makes it easier and faster to obtain the desired information than integrated search. For future research, it is necessary to expand the range of information provided to users.

Factors to Affect Acceptance of Open Banking from Information Security Perspectives (정보보호 관점에서의 오픈뱅킹 수용도에 대한 영향요인)

  • Go, Jeunghyeun;Lee, Woonboo
    • Journal of Information Technology Services
    • /
    • v.20 no.6
    • /
    • pp.63-81
    • /
    • 2021
  • Joint financial network of Korea Financial Telecommunications and Clearings Institute, which is an essential facility with a natural monopoly, maintained its closedness as monopoly/public utility model, but it has evolved in the form of open banking in order to obtain domestic fintech competitiveness in the rapidly changing digital financial ecosystem such as the acceleration of Big Blur. In accordance with digital transformation strategy of financial institutions, various ICT companies are actively participating in the financial industries, which has been exclusive to banks, through the link technology called Open API. For this reason, there has been a significant change in the financial service supply chain in which ICT companies participate as users. The level of security in the financial service supply chain is determined based on the weakest part of the individual components according to the law of minimum. In addition, there is a perceived risk of personal information and financial information leakage among the main factors that affect users' intention to accept services, and appropriate protective measures against perceived security risks can be a catalyst, which increases the acceptance of open banking. Therefore, this is a study on factors affecting the introduction of open banking to achieve financial innovation by developing an open banking security control model for financial institutions, as a protective measures to user organizations, from the perspectives of cyber financial security and customer information protection, respectively, and surveying financial security experts. It is expected, from this study, that effective information protection measures will be derived to protect the rights and interests of financial customers and will help promote open banking.