• Title/Summary/Keyword: Second-order Factor Analysis

Search Result 821, Processing Time 0.029 seconds

A Study on the Differences in Awareness of the Social Value of Public Libraries between Public library Users and Non-Users: Focused on Paju City (공공도서관의 사회적 가치에 대한 이용자와 비이용자의 인식 차이에 관한 연구 - 파주시를 중심으로 -)

  • Dong-Geun Oh;Dong-Jo Noh
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.35 no.1
    • /
    • pp.47-71
    • /
    • 2024
  • This study aims to compare the awareness of the social value of public libraries between users and non-users to materialize the abstract concept of social value and, thereby, to present measures that can be applied to the library field. For this purpose, a survey was conducted in person or online for 15 days from May 7, 2023, targeting Paju citizens. Frequency analysis, factor analysis, independent samples t-test, and one-way analysis of variance were conducted on 206 valid response copies using SPSS 25.0. In the results, it is shown that, first, for awareness of the social value of public libraries according to socio-demographic characteristics, there were significant differences depending on age, with in particular, awareness among those in their 10s and 40s being higher than other age groups. For awareness of community development, the awareness of the female group was higher than that of the male group, while, for the awareness according to occupation, it is shown that awareness was highest in the following order: student, others, housewife, self-employed, and office worker. Second, for the awareness of the social value of public libraries, the awareness of the user group was higher than that of the non-user group in all areas. Third, for awareness of the social value of public libraries according to the level of library use, there was no significant difference between groups. In conclusion, it is suggested that measures to encourage non-users to become users, develop new content and services targeting male group and those in their 60s, and 20s, and strengthen community activities are needed to raise awareness of the social value of Paju City public libraries in the future.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

A Longitudinal Validation Study of the Korean Version of PCL-5(Post-traumatic Stress Disorder Checklist for DSM-5) (PCL-5(DSM-5 기준 외상 후 스트레스 장애 체크리스트) 한국판 종단 타당화 연구)

  • Lee, DongHun;Lee, DeokHee;Kim, SungHyun;Jung, DaSong
    • Korean Journal of Culture and Social Issue
    • /
    • v.28 no.2
    • /
    • pp.187-217
    • /
    • 2022
  • The aim of this study is to examine the psychometric properties of the Korean version of the Post-traumatic Stress Disorder Checklist for DSM-5(PCL-5). For this purpose, online surveys were conducted for two times with a one year interval using the data from 1,077 Korean adults at time 1, and 563 Korean adults at time 2. First, from the result of the confirmatory factor analysis, comparing the model fit of the 1, 4, 6, and 7-factor model, the 4, 6, and 7-factor model showed a acceptable fit, and the best fit was seen in the order of the 7, 6, 4-factor model. Second, the internal consistency, omega coefficient, construct validity, average variance extracted, and test-retest reliability results were all satisfactory.. Third, a correlation analysis with the K-PC-PTSD-5 and the sub-factors of BSI-18 was conducted to check the validity of the Korean Version of PCL-5. As a result, a positive correlation was seen with both K-PC-PTSD-5 and BSI-18. Fourth, a hierarchical multiple regression was performed to examine whether the Korean Version of PCL-5 predicts future PTSD, depression, anxiety, and somatization. As a result, the Korean Version of PCL-5 measured at time 1 significantly predicted PTSD, depression, anxiety, and somatization symptoms at time 2. Fifth, by analyzing the ROC curve, the discriminant power of PCL-5 for screening PTSD symptom groups was confirmed, and the best cut-off score was suggested. As a result of the longitudinal validation of Korean version of PCL-5, it was found that this scale is a reliable and valid measure for Korean adults. By looking into the predictive validity of the scale, it was found that the Korean version of PCL-5 can predict not only PTSD symptoms but also PTSD-related symptoms such as depression, anxiety, and somatization. Also, this study differs from previous validation studies measuring PTSD symptoms in that it suggested a cut-off score to help differentiate PTSD symptom groups.

The Satisfaction Analysis of Mount Tai Mountaineering Road Sign System Using Fuzzy Comprehensive Evaluation (퍼지 종합 평가를 활용한 태산(泰山)등산로 사인시스템 만족도 분석)

  • Yu, Ying;Jung, Taeyeol
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.48 no.3
    • /
    • pp.22-33
    • /
    • 2020
  • Sign system is one of the most widely used guide media in scenic spots. It plays vital role in introducing cultural values of destinations to tourists with better visit experience. The purpose of this study is to derive the influence factors of the sign system of Mount Tai scenic area for tourists, analyze the satisfaction of tourists, and provide suggestions for the sign system of Mount Tai Mountaineering Road to improve tourists' satisfaction in the future. The evaluation items of Mount Tai Mountaineering Road sign system were derived from the previous studies and then subdivided comprehensively. Survey by questionnaires was carried out to obtain the influence factors. In order to understand the satisfaction degree of tourists, fuzzy comprehensive evaluation was implemented. The research results of this study are summarized as follows. First, four influence factors of the sign system on Mountaineering Road of Mount Tai were concluded as the interpretation content, appearance modeling, interpretation methods and layout management. Second, the order of weight values of influence factors was the interpretation content, appearance modeling, interpretation methods and layout management respectively from high to low, which means that tourists paid more attention to practicality and aesthetics. Third, the satisfaction degree of the tourists on the sign system was different. The satisfaction level for the three factors (interpretation content, appearance modeling, layout management) was good, while the satisfaction for interpretation method was medium. The reason was that it failed to deepen the understanding of tourists on the natural and cultural values of Mount Tai Mountaineering Road. These results indicate great significance to provide theoretical basis for the later readjustment and design of the sign system and to improve the overall satisfaction of tourists on tourism experience.

A Study on the Satisfaction and Achievement of Learning by Female Learner's Characteristics in Internet Education Program (여성 학습자의 특성에 따른 인터넷교육 프로그램 만족도와 학업성취도에 관한 연구)

  • Lim, Kwang Myung;Kim, Sung Soo
    • Journal of Agricultural Extension & Community Development
    • /
    • v.8 no.1
    • /
    • pp.25-40
    • /
    • 2001
  • The purposes of the study were to identify satisfaction and achievement of learning by female learner's characteristics, and to suggest measures to improve quality of education in internet education programs. In order to determine the educational effectiveness associated with the characteristics of learners, this study attempted to employ two way approaches by observing the degree of achievement for learning, which represents an instructor-oriented approach, and the degree of satisfaction for education, which represents a learner-oriented approach to enhance the quality of internet education for female learners. As an approach to evaluate the educational effectiveness, the degree of achievement in learning(Tyler's classical approach), and the degree of satisfaction for education (Scriven's consumer-oriented evaluation model) were utilized. A survey form was developed by the researcher after reviewing the various tools originated from Boshier, Cross, Gagne and Choi, and distributed to a panel of judges that examined the content validity of the instrument. The sample for the study consisted of 160 female learners from three universities in Seoul and capital area, and the survey form was used to collect data for this study. The SPSS WIN program was used in analyzing the data and a series of statistical tests were conducted including frequency, percentile, t-test, ANOVA, correlation, multiple regression, and factor analysis. The statistical significance level was 0.05. The following conclusion were drawn from this study of female internet education. First, it was evident that female internet learners tend to utilize information from internet, and this can be interpreted as participants' positive attitude, and voluntary participation. Second, educational facilities and services should be improved in the future, because the level of satisfaction was low in these areas compared to curriculum and educational methodology. Third, the participating factors influenced by the level of satisfaction for education of learner characteristics were the 'formation of inter-personal relationship and willingness to change' and the 'needs for education on internet', thus appeared that both social and educational needs influenced the level of satisfaction for education. Fourth, the degree of achievement in learning was higher in the order of 1) attitude 2) function 3) knowledge, thus, attitude change was the most important in achievement of learning. Fifth, the individual background that influenced the level of achievement in learning were age and educational experience. As for the individual level of achievement for learning, the younger and more educated group were more satisfied.

  • PDF

The Factor Influencing to the Effectiveness of Prevention Policies of the Criminal Victimization of North Korean Defectors (북한이탈주민 범죄피해 예방정책의 효과성에의 영향요인)

  • Lim, Chang-Ho;Kim, Yun-Young
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.223-249
    • /
    • 2017
  • The purpose of this study is to analyze the actual situation of crime victimization by North Korean defectors and to examine whether any of the protection and support systems for defectors has a statistically significant effect on the perceived effectiveness for preventing the criminal victimization of North Korean Defectors. The subjects of this study were 107 police officers from the 17 provincial police departments. Independent variables were (1) social adaptation education in Hanawon, (2) protection officer system, (3) legal support system, (4) private participation system, (5) support for family life, (6) community participation activity. And the dependent variable is the crime prevention effectiveness for the defectors. As a result of multiple regression analysis, it was found that the independent variables that have a significant effect on the effectiveness of prevention of crime victimization were protection officer system and support for family life. First, in order to prevent the crime victimization of North Korean defectors in advance, three kinds of protection officer system that will be received after the transfer of the residence should play the role successfully. Second, the efforts of the government and municipalities alone are insufficient for the early settlement of North Korean defectors. Therefore, it is necessary to diversify the support and protection programs for North Korean refugees through cooperation with civic organizations. Third, it is necessary to expand the legal education time so that North Korean defectors do not suffer crime because of lack of legal knowledge. Fourth, in order to prevent North Korean defectors from being victimized by various kinds of crime, it is necessary to actively support them so that family life can be stabilized.

  • PDF

Box-Wilson Experimental Design-based Optimal Design Method of High Strength Self Compacting Concrete (Box-willson 실험계획법 기반 고강도 자기충전형 콘크리트의 최적설계방법)

  • Do, Jeong-Yun;Kim, Doo-Kie
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.19 no.5
    • /
    • pp.92-103
    • /
    • 2015
  • Box-Wilson experimental design method, known as central composite design, is the design of any information-gathering exercises where variation is present. This method was devised to gather as much data as possible in spite of the low design cost. This method was employed to model the effect of mixing factors on several performances of 60 MPa high strength self compacting concrete and to numerically calculate the optimal mix proportion. The nonlinear relations between factors and responses of HSSCC were approximated in the form of second order polynomial equation. In order to characterize five performances like compressive strength, passing ability, segregation resistance, manufacturing cost and density depending on five factors like water-binder ratio, cement content, fine aggregate percentage, fly ash content and superplasticizer content, the experiments were made at the total 52 experimental points composed of 32 factorial points, 10 axial points and 10 center points. The study results showed that Box-Wilson experimental design was really effective in designing the experiments and analyzing the relation between factor and response.

The Effects of Knowledge Complementarities and Trust on IT Outsourcing Effectiveness (지식 상호보완성과 신뢰가 IT 아웃소싱 효과에 미치는 영향에 관한 연구)

  • Shin, Ho-Kyoung;Kim, Kyung-Kyu
    • Asia pacific journal of information systems
    • /
    • v.17 no.3
    • /
    • pp.55-78
    • /
    • 2007
  • Increasingly the information technology (IT) outsourcing phenomenon has been a subject of much academic research. Scholars have argued that knowledge complementarities playa crucial role in forming successful IT outsourcing relationships. However, notwithstanding the fast growth of IT outsourcing, prior studies on IT outsourcing have not included knowledge complementarities in their research design as a determining factor for IT outsourcing effectiveness. Further, the understanding of knowledge complementarities itself remains ambiguous. In this study, the concept of knowledge complementarities is explored in the IT outsourcing context at the firm level. Specifically, it addresses the following questions: what is knowledge complementarities? How does it affect IT outsourcing effectiveness? Is the relationship between knowledge complementarities and IT outsourcing effectiveness influenced by organizational trust between the client and the vendor? Grounded in the relevant theories to knowledge management and IT outsourcing, we develop a research model in which both the main effects of knowledge complementarities and organizational trust and the moderating effect of organizational trust on the relationships between knowledge complementarities and IT outsourcing effectiveness are tested. Within this research model, we develop a second order construct of knowledge complementarities, consisting of complementary business knowledge and complementary IT knowledge as the first order constructs. We have used data from a field study of 103 firms in Korea to test the proposed model. Controlling the effects of conflict resolution efforts, our empirical analysis found significant main effects of knowledge complementarities and organizational trust on IT outsourcing effectiveness. The results suggest that knowledge complementarities between the client and vendor positively contribute to IT outsourcing effectiveness. Specifically, the client needs to have enough IT knowledge to assess the quality of IT outsourcing services provided by the vendor. Meanwhile, the vendor should understand the client's business well enough to provide IT services, Contrary to our expectations, the moderating effect of trust on the relationship between knowledge complementarities and IT outsourcing effectiveness was not supported in this study. The results also show that organizational trust between client and vendor significantly influences IT outsourcing effectiveness. As for contributions of this study, we have not only clarified the concept of knowledge complementarities, but also developed an instrument to measure the concept and empirically validated it. Further, we have tested the idea that knowledge complementarities and trust directly influence IT outsourcing effectiveness and trust moderates the relationship between knowledge complementarities and IT outsourcing effectiveness. Out results prescribe the knowledge complementarities of client and vendor as a useful path to IT outsourcing effectiveness. These findings have important theoretical and practical implications, which are discussed in the paper.

Study on Adsorption Equilibrium, Kinetic and Thermodynamic Parameters of Murexide by Activated Carbon (입상 활성탄에 의한 Murexide의 흡착 평형, 동력학 및 열역학 파라미터에 관한 연구)

  • Lee, Jong-Jib
    • Clean Technology
    • /
    • v.25 no.1
    • /
    • pp.56-62
    • /
    • 2019
  • The equilibrium, kinetic and thermodynamic parameters of adsorption of murexide by granular activated carbon were investigated. The experiment was carried out by batch experiment with the variables of the amount of the adsorbent, the initial concentration of the dye, the contact time and the temperature. The isothermal adsorption equilibrium was best applied to the Freundlich equation in the range of 293 ~ 313 K. From the separation factor (${\beta}$) of Freundlich equation, it was found that adsorption of murexide by granular activated carbon could be the appropriate treatment method. The adsorption energy (E) obtained from the Dubinin- Radushkevich equation shows that the adsorption process is a physical adsorption process. From the kinetic analysis of the adsorption process, pseudo second order model is more consistent than pseudo first order model. It was found that the adsorption process proceeded to a spontaneous process and an endothermic process through Gibbs free energy change ($-0.1096{\sim}-10.5348kJ\;mol^{-1}$) and enthalpy change ($+151.29kJ\;mol^{-1}$). In addition, since the Gibbs free energy change decreased with increasing temperature, adsorption reaction of murexide by granular activated carbon increased spontaneously with increasing temperature. The entropy change ($147.62J\;mol^{-1}\;K^{-1}$) represented the increasing of randomness at the solid-solution interface during the adsorption reaction of murexide by activated carbon.

Impacts of Relative Advantage of Fast Food Restaurant's O2O Service and Consumer Involvement on Consumer Engagement, and Store Loyalty: Focused on MZ Generationsin Untact Consumption Era

  • LEE, Young-Eun;LEE, Yong-Ki
    • The Korean Journal of Franchise Management
    • /
    • v.11 no.2
    • /
    • pp.41-51
    • /
    • 2020
  • Purpose: Fast food franchise companies are trying a variety of innovative services to increase their competitiveness in response to changes in population composition in the fast food market and rapid changes in consumption trends due to technological development. From this point of view, franchise companies that have focused on offline store operations are providing O2O (offline to online) service as a core service for customer convenience. This new attempt is a strategy to increase loyalty by applying an interaction method based on understanding the characteristics of new generation consumers. However, existing studies are focused on the relationship between O2O service and acceptance, so very little is known about how O2O service affects customer loyalty. Therefore, this study examines the impacts of customer involvement and relative advantages of fast food O2O service on customer brand engagement (cognitive and affective engagement) and store loyalty for MZ(Millennials - Z) generations. Research design, data, and methodology: In order to achieve the purposes of this research, several hypotheses were developed. The data were collected from 247 questionnaires in their 16-30s and were analyzed using SPSS 22.0 and SmartPLS 3.0 program. Measurement model analysis was carried out to assess convergent and discriminant validity. Also, common method bias was tested using the values of VIF (variance inflation factor). The hypotheses was tested using structural equation modeling. Result: First, involvement has a positive effect on cognitive and affective engagement. Second, relative advantages have has a positive effect on cognitive and affective engagement. Third, cognitive influences affective engagement. Finally, both cognitive and affective engagement affect store loyalty, but affective engagement has a stronger effect on store loyalty than cognitive engagement. Conclusions: In the process of consumer-brand interaction, it was confirmed that store loyalty was influenced by cognitive and affective engagement sequentially. However, the results show that affective engagement has a relatively stronger on store loyalty than cognitive engagement. Therefore, it is necessary to establish an O2O service strategy to maintain long-term loyal customers by inducing cognitive participation with high-involved consumer, as well as affective interaction, in order to obtain new customers and increase customer loyalty.