• Title/Summary/Keyword: Internet Use Motivation

Search Result 107, Processing Time 0.026 seconds

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Impact of Digital Divide on Online Political Participation: With Focus on the Gap of Operational Skills of Digital Device Users (온라인 정치참여에서 디지털 정보격차의 영향: 디지털 기기 이용자의 기기 운용 기술 격차를 중심으로)

  • Jang, Changki;Sung, WookJoon
    • Informatization Policy
    • /
    • v.27 no.1
    • /
    • pp.36-54
    • /
    • 2020
  • This study empirically analyzes the impact of digital divide between digital device usage motivation and operational skills on online political participation. The analysis was performed using the National Information Society Agency's 2018 digital divide survey data from September to December 2018 and applying the Heckman selection model to control the sample selection bias that may occur between internet users and non-users. The result shows the gap in motivation and device operational skills of individual citizens using digital devices has significant impact on online political participation. In socio-economic terms, it shows the age, education level and regional factors also have significant impact on online political participation, while gender and income levels do not. This study holds significance in that there are different patterns of digital divide between digital devices, identifying the motivation to use a digital device as an important factor for mobile device users, and the device operational skills, for personal computer users.

A Study on User's Acceptance of Blockchain-based Copyright Distribution Platforms and Its Usage (소비자의 블록체인 기반 저작권 유통 플랫폼 수용의도와 이용행위에 관한 연구)

  • Yoo, Young-Hwan;Park, Hyeon-Suk
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.3
    • /
    • pp.59-72
    • /
    • 2019
  • Purpose - Blockchain technology, which has the characteristics of credibility, security, integrity and decentralization, has brought innovation to internet platforms that mediate peer to peer transactions, as well as changes to the contents distribution services. Blockchain-based copyright distribution platforms can solve problems which have been articulated on prior internet social networks: increased market dominance of platform business because of centralization with no reward to creators who upload on platforms, and lack of fairness, such as unfair profit distribution between the copyright holder and businesses. With this background, the current research confirmed the factors that affect the intention of usage and behaviors, targeting potential users of blockchain-based copyright distribution platforms. Research design, data, and methodology - Centered around the UTAUT2 Model, the research model was designed with 'Perceived Security' added as Construct, and 'Age' and 'Knowledge Level' added as moderating variables. For data, 607 responses were collected by an online survey, and 601 responses were included in the final analysis. We analyzed the research model and sample by using SPSS 23.0 and AMOS 23.0 on the collected responses. Results - First, results of research on whether Constructs make positive effects on Intention of use is: social influence, facilitating conditions, habit, and perceived security had positive effects on intention of use, and performance expectancy, effort expectancy, hedonic motivation, and economic value did not. Second, results of the research on whether facilitating condition, habit, and intention of use made an impact on using behaviors, it was shown that only habit and intention of use made positive effects. Third, in two groups divided by age above or under 40, group effort expectancy, intention of use, habit, and intention of use had controlling effects, and facilitating condition, intention of use, perceived security, and intention of use had effects in both groups. Conclusions - The research shows that no matter how great a blockchain-based platform is, if advantages of blockchain are not proved in various industries and utilized in real life like the internet, blockchain-based distribution systems will develop slowly. Rather than a short-term inducement emphasizing technology, there is a need for a strategic approach that can foster the environment.

An Experimental Study on the Design of Digital Media Systems using Hue and Color Contrast (색조와 색상차를 이용한 디지털 미디어 시스템의 설계 방안에 대한 실험적 연구)

  • Kim, Jin-Woo;Jeon, Seok-Won;Lee, Su-Jin
    • Information Systems Review
    • /
    • v.9 no.3
    • /
    • pp.133-156
    • /
    • 2007
  • The wide spread of the Internet and personal computers does not only alter the form of content from analog to digital, but also lead to the emergence of a new digital media system that is different from analog media system. The digital media system is a convergent media that includes both public and private systems from the perspective of use-limitation, as well as storage and enjoyment systems from the perspective of use-purpose. The major goal of this research is to suggest and empirically verify an effective way of presenting the perception of places that are converged in the digital media system. Involvement and motivation are suggested as key conceptual factors and color contrast and hue are suggested as concrete design factors to make people perceive corresponding places. Results of our controlled experiment indicated that the color contrast and hue significantly affected the perception of place, and consequently, influenced usability of the digital media system. This paper ends with implications that can be used to construct appropriate perception of places for the media system of digital products.

Development of Digital Mileage Service System using Smart-Phone (스마트폰을 이용한 디지털 적립 서비스 시스템 개발)

  • Kang, Nam-Hi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.137-142
    • /
    • 2011
  • Increasing users of smart phone and various marketing strategies activate lots of mobile mileage services recently. Such a mileage service is a typical marketing service to increase brand loyalty of clients and maximize purchase motivation. However, traditional offline mileage services introduce discomfort that users have to carry lots of mileage cards physically. Also, in case of using digital mobile mileage service, users have to search specific card to use from lots of digital cards stored in his mobile device. In this paper, to solve the problems, we design and develop a mobile mileage service system that especially discover a proper card automatically based on location information of user.

3D Motion Capture based Physical Fitness using Full Body Tracking Suit

  • Imran Ghani;Emily Hattman;David T. Smith;Muhammad Hasnain;Israr Ghani;Seung Ryul Jeong
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.47-56
    • /
    • 2023
  • This paper presents an approach to exercise that utilizes motion capture through the Rokoko Smart Suit. With the emergence of Covid-19, physical fitness levels have declined due to restrictions on in-person fitness classes and gym closures. To maintain physical activity, many individuals have turned to mobile applications and streaming videos. However, home workouts often lack the motivation and experience found in gyms, classes, or community centers, particularly with the presence of coaches and instructors. Additionally, instructors find it challenging to convey precise postures to their online students, and vice versa. To address this issue, the researchers propose the use of a full-body tracking suit like the Rokoko Smart Suit, which enables instructors to present a more realistic approach to physical activity. The Rokoko Smart Suit offers a 3D view of the instructor, eliminating the limitations of camera scope when streaming on platforms like Zoom or MS Teams. This technology enhances the at-home workout experience, and the incorporation of 3D virtual reality features can further elevate the realism of a workout.

An Empirical Study on Web Sites Evaluation by Industry Type (WebMAC Business를 이용한 업종별 웹사이트 평가에 관한 실증 연구)

  • Chung, Kyung-Soo;Kim, Jung-Young;Noh, Mi-Jin
    • Information Systems Review
    • /
    • v.5 no.2
    • /
    • pp.91-108
    • /
    • 2003
  • The number of companies which use Internet and Web grow at an explosive rate and most of them made use of the Web sites for business activity such as publicity, advertising, customer support, and online retailing. However, there are very few empirical studies on web sites evaluation based on theoretical framework. The primary purpose of this study is to evaluate motivational effectiveness of Web sites using the WebMAC Business instrument. In this paper, we introduced a lot of Web sites evaluation studies and several IS studies based on the motivation theory. Web sites evaluation was performed by four motivational factors which include stimulating, meaningful, organized, and easy-to-use. There are significant differences among the industry type about motivational factors. This study identifies areas for improvement of existing Web sites and suggests several guidelines for development of Web sites from the user's perspective.

Factors Drawing Members of a Financial Institution to Information Security Risk Management (금융기관 종사자들을 정보보안 위험관리로 이끄는 요인)

  • An, Hoju;Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.39-64
    • /
    • 2015
  • As information and information technology become more important in competitive corporate environments, the risk of information security breaches has increased accordingly. Although organizations establish security measures to manage information security risks, members of organizations do not comply with them well, and their information security behavior intention is unclear. Therefore, to understand the information security risk management intention of the members of organizations, the present study developed a research model using Protection Motivation Theory, Supervisory Authority Pressure, and Background factors. This study presents empirical research findings based on the analysis of survey data from 201 members of financial institutions. Perceived Severity, Self-efficacy, and Supervisory Authority Pressure had a positive effect on intention; however, Perceived Vulnerability and Response Efficacy did not affect intention. Security Avoidance Habit, which was considered a background factor, had a negative effect on all parameters, and did not have an effect on intention. Security Awareness Training, another background factor, had a positive effect on information security risk management intention and perceived vulnerability, self-efficacy, response efficacy, and supervisory authority pressure, and had no effect on perceived severity. This study used supervisory authority pressure and background factors in the field of information security, and provided a basis to use supervisory authority pressure in future studies on behavior of organizations and members of an organization. In addition, the use of various background factors presented the groundwork for the expansion of protection motivation theory. Furthermore, practitioners can use the study findings as a foundation for organization's security activities, and to improve regulations.

An Analysis of the Case Study on Tablet Computer based Mobile Learning Environment (타블렛 컴퓨터를 활용한 모바일 학습사례 분석)

  • Lee, Youngmin
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.1
    • /
    • pp.25-32
    • /
    • 2005
  • An analysis of the case study was reported to pioneer the perceptions of teachers, students, and parents for the educational use of tablet computers. The findings showed that the amount of learning, various learning activities, interest, and motivation of learners increased and that the teachers perceived the potentiality of the tablet computer and the necessity of a training for designing mobile-based instructions.

  • PDF

Implementation of a Virtual Training System on Gas Safety

  • Wouseok Jou;Tae-sik Lim;Kyong-sik Kang;Tae-ok Kim
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2000.11a
    • /
    • pp.1-5
    • /
    • 2000
  • With the advent of the internet era, web-based virtual training system is gaining its importance in recent years. Because of the fact that the training can take place in any place and at any time, the virtual system is now replacing many of the conventional off-line classes. Hardware environments such as communication bandwidth and computer performance gets fast enough to accommodate the virtual education. Based on the observations on current virtual training system, this paper proposes three critical design rules required when developing a new virtual training system: i) With conceptual mapping, the menu hierarchy can be organized in a clear-cut manner, ii) Extensive use of multimedia tools can help students keep their attention to the lecture materials, and iii) Provision of interaction mechanisms helps students to gain their identity and motivation.

  • PDF