• Title/Summary/Keyword: Degree of Theory Use

Search Result 148, Processing Time 0.026 seconds

Evaluating Service Reliability focused on Failure Modes (실패모드에 근거한 서비스 신뢰도 평가모델)

  • Oh, Hyung-Sool
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.3
    • /
    • pp.133-141
    • /
    • 2012
  • Service and manufacturing companies' efforts are increasingly focused on utilizing services to satisfy customers' needs and survive in today's competitive market environment. The value of services depends mainly on service reliability that is identified by satisfaction derived from the relationship between customer and service provider. In this paper, we extend concepts from the failure modes and effects analysis of tangible systems to services. We use an event-based process model to facilitate service design and represent the relationships between functions and failures in a service. The objective of this research is to propose a method for evaluating service reliability based on service processes using fuzzy failure mode effects analysis (FMEA) and grey theory. We define the failure mode of service as interaction ways that can be failed in a service delivery process. The fuzzy set theory is used to characterize service reliability based on linguistic terms during FMEA. Grey theory is employed to determine the degree of relation and ranking among risk factors that are represented as potential failure causes. To demonstrate implementation of the proposed method, we use a case study involving a typical automotive service operation.

  • PDF

The Employee's Information Security Policy Compliance Intention : Theory of Planned Behavior, Goal Setting Theory, and Deterrence Theory Applied (조직구성원의 정보보안 정책 준수의도: 계획된 행동이론, 목표설정이론, 억제이론의 적용)

  • Hwang, In-Ho;Lee, Hye-Young
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.155-166
    • /
    • 2016
  • In accordance with the increase of the importance of information security, organizations are making continuous investments to develop policies and adapt technology for information security. Organization should provide systemized support to enhance employees' security compliance intention in order to increase the degree of organization's internal security. This research suggests security policy goal setting and sanction enforcement as a method to improve employees' security compliance in planning and enforcing organization's security policy, and verifies the influencing relationship of Theory of Planned Behavior which explains employee's security compliance intention. We use structural equation modeling to verify the research hypotheses, and conducted a survey on the employees of organization with information security policy. We verified the hypotheses based on 346 responses. The result shows that the degree of goal setting and sanction enforcement has positive influence on self-efficacy and coping efficacy which are antecedents that influence employees' compliance intention. As a result, this research suggested directions for strategic approach for enhancing employee's compliance intention on organization's security policy.

Design of Fuzzy Logic based Classifying System for the Degree of Goodness of Steel Balls (강구의 결함 판별을 위한 퍼지 논리 기반의 알고리즘 개발)

  • Kim, Tae-Kyun;Choi, Byung-Jae;Kim, Yoon-Su;Do, Yong-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.2
    • /
    • pp.153-159
    • /
    • 2009
  • The steel balls are core elements between inner part and outer part in a bearing system. The degree of goodness of the steel balls has been visually processed by human beings. In this paper we propose a new method that uses image processing algorithm and fuzzy logic theory. We use fuzzy inference engine and fuzzy Choquet integral algorithm in the proposed system. We first distinguish the defects of the steel balls by an image processing algorithm. And then the degree of the defects is classified by a fuzzy logic system. We perform some simulations to show the effectiveness and feasibility of the proposed system.

Analyzing Comments of YouTube Video to Measure Use and Gratification Theory Using Videos of Trot Singer, Cho Myung-sub (YouTube 동영상 의견분석을 통한 사용과 충족 이론 측정 : 트로트 가수 조명섭 동영상을 중심으로)

  • Hong, Han-Kook;Leem, Byung-hak;Kim, Sam-Moon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.9
    • /
    • pp.29-42
    • /
    • 2020
  • The purpose of this study is to present a qualitative research method for extracting and analyzing the comments written by YouTube video users. To do this, we used YouTube users' feedback to measure the hedonic, social, and utilitarian gratification of use and gratification theory(UGT) through by using analysis and topic modeling. The result of the measurement found that the first reason why users watch the trot singer, Cho Myung-sub's video in the KBS Korean broadcasting channel is to achieve hedonic gratification with high frequency. In word-document network analysis, the degree of centrality was high in words, such as 'cheering', 'thank you', 'fighting', and 'best'. Betweenness centrality is similar to the degree of centrality. Eigenvector centrality also shows that words such as 'love', 'heart', and 'thank you' are the most influential words of users' opinions. The results of the centrality analysis present that the majority of video users show their 'love', 'heart' and 'thank you' for the video. it indicates that the high words in centrality analysis is consistent with the high frequency words of hedonic and social gratification dimension of the UGT. The study has research methodological implication that shed light on the motivations for watching YouTube videos with UGT using text mining techniques that automate qualitative analysis, rather than following a survey-based structural equation model.

Self-Directed Learning Evaluation Using Fuzzy Grade Sheets

  • Kim, Kwang-Baek;Kim, Byung-Joo;Cho, Jae-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.2
    • /
    • pp.97-101
    • /
    • 2004
  • This paper is about the use of existing evaluation methods, which evaluate learning determined by the score of an exam, which is either a multiple-choice type or single choice type question. These scores don't show the objective evaluations that cause some negative opinions about the scores. In this paper, we propose that the evaluation of the methods of self-directed learning use the triangle-type function of the fuzzy theory so that the learner can objectively evaluate their own learning ability. The proposed method classifies the result of learning into three fuzzy grades to calculate membership, and evaluate the result of an exam according to the final fuzzy grade degree as applied to the fuzzy grade sheets.

Security Determinants of the Educational Use of Mobile Cloud Computing in Higher Education

  • Waleed Alghaith
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.50-62
    • /
    • 2024
  • The decision to integrate mobile cloud computing (MCC) in higher education without first defining suitable usage scenarios is a global issue as the usage of such services becomes extensive. Consequently, this study investigates the security determinants of the educational use of mobile cloud computing among universities' students. This study proposes and develops a theoretical model by adopting and modifying the Protection Motivation Theory (PMT). The study's findings show that a significant amount of variance in MCC adoption was explained by the proposed model. MCC adoption intention was shown to be highly influenced by threat appraisal and coping appraisal factors. Perceived severity alone explains 37.8% of students "Intention" to adopt MCC applications, which indicates the student's perception of the degree of harm that would happen can hinder them from using MCC. It encompasses concerns about data security, privacy breaches, and academic integrity issues. Response cost, perceived vulnerability and response efficacy also have significant influence on students "intention" by 18.8%, 17.7%, and 6.7%, respectively.

Security Determinants of the Educational Use of Mobile Cloud Computing in Higher Education

  • Waleed Alghaith
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.105-118
    • /
    • 2024
  • The decision to integrate mobile cloud computing (MCC) in higher education without first defining suitable usage scenarios is a global issue as the usage of such services becomes extensive. Consequently, this study investigates the security determinants of the educational use of mobile cloud computing among universities students. This study proposes and develops a theoretical model by adopting and modifying the Protection Motivation Theory (PMT). The studys findings show that a significant amount of variance in MCC adoption was explained by the proposed model. MCC adoption intention was shown to be highly influenced by threat appraisal and coping appraisal factors. Perceived severity alone explains 37.8% of students "Intention" to adopt MCC applications, which indicates the student's perception of the degree of harm that would happen can hinder them from using MCC. It encompasses concerns about data security, privacy breaches, and academic integrity issues. Response cost, perceived vulnerability and response efficacy also have significant influence on students "intention" by 18.8%, 17.7%, and 6.7%, respectively.

The Effects of Information Volume and Distribution on Cognitive Load and Recall: Implications for the Design of Mobile Marker-less Augmented Reality

  • LIM, Taehyeong;BONG, Jiyae;KANG, Ji Hei;DENNEN, Vanessa
    • Educational Technology International
    • /
    • v.20 no.2
    • /
    • pp.137-168
    • /
    • 2019
  • This study examined the effects of information volume and distribution on learners' cognitive load and recall in a mobile augmented reality (AR) environment. Information volume refers to the degree of information users are provided in a learning task, while information distribution indicates the way in which information is distributed, either in a virtual or real format. Sixteen undergraduate students participated in the study, which employed a 2 × 3 randomized block factorial design with repeated measures. Information volume and distribution were independent variables, and factors in learners' cognitive load (mental effort, perceived ease of use, and perceived task difficulty) and recall test scores were the dependent variables. Information volume had significant main effects on perceived ease of use and task difficulty, and recall test scores, while information distribution had significant main effects on perceived task difficulty and test scores. A detailed discussion and implications are provided.

The Effect of Innovation Resistance of Users on Intention to Use Mobile Health Applications (이용자의 혁신저항이 모바일 건강 앱 이용의도에 미치는 영향)

  • Kim, Dong Hun;Lee, Yong Jeong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.31 no.1
    • /
    • pp.5-20
    • /
    • 2020
  • The study aimed at identifying the causes of the high level of health application but the low level of use. In other words, the effects of user's innovation resistance (use barrier, value barrier, risk barrier, traditional barrier, image barrier, etc.) were examined. For this study, 378 valid responses were collected by conducting surveys with college students. Findings indicated the higher the level of image barrier of the user, the higher the degree of innovation resistance for the health application, and the higher the degree of innovation resistance, the lower intention of continuous use and recommendation. In addition, the level of use barriers, value barriers and traditional barriers did not have a significant effect on the degree of innovation resistance, suggesting that users familiar with smartphones have low resistance to health applications. The study deepens the theoretical discussion about the adoption and continuous use of new technologies by explaining the use of health applications in the theory of innovation resistance. The findings of the study provide the practical implications that lowering the image barriers rather than the usage barriers, value barriers and traditional barriers will be effective for the adoption and continuous use of health applications.

A Study on Determination of the Degree of Consolidation and Time Factor Considering Site Ground Characteristics (현장 지반특성을 고려한 압밀도 및 시간계수 결정에 관한 연구)

  • Choi, Min-Ju;Kim, Hung-Nam;Lee, Kang-Il
    • Journal of the Korean Geosynthetics Society
    • /
    • v.21 no.1
    • /
    • pp.23-32
    • /
    • 2022
  • This study is conducted to minimize the problems caused by the difference between the settlement and settlement time of the one-dimensional consolidation analysis by the Terzaghi's consolidation theory, which is generally used in domestic soft soil design, from the settlement and settlement time measured at the field site. Consolidation-time factor considering the field site characteristics can be determined using the relationship among the degree of consolidation, settlement time, and time factor, the time-settlement curve measured at the field is reverse- analysis using a numerical-analysis technique to reproduce the same consolidation behavior as in the field. Time-settlement and time-excessive pore water pressure data when the same consolidation behavior as the site is reproduced Consolidation-time factor of the soil of Songsan Green City by settlement and excess pore water pressure was calculated using the settlement and excess pore water pressure for each settlement time. If the results of this study use the Terzaghi consolidation-time factor, which does not consider the consolidation characteristics of the soft ground target area, it is difficult to determine the end time of the soft ground during construction. It is necessary to use the established settlement-time factor.