• Title/Summary/Keyword: Users' intentions

Search Result 261, Processing Time 0.026 seconds

Analysis of Korean Patent & Trademark Retrieval Query Log to Improve Retrieval and Query Reformulation Efficiency (질의로그 데이터에 기반한 특허 및 상표검색에 관한 연구)

  • Lee, Jee-Yeon;Paik, Woo-Jin
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.2
    • /
    • pp.61-79
    • /
    • 2006
  • To come up with the recommendations to improve the patent & trademark retrieval efficiency, 100,016 patent & trademark search requests by 17,559 unique users over a period of 193 days were analyzed. By analyzing 2,202 multi-query sessions, where one user issuing two or more queries consecutively, we discovered a number of retrieval efficiency improvements clues. The session analysis result also led to suggestions for new system features to help users reformulating queries. The patent & trademark retrieval users were found to be similar to the typical web users in certain aspects especially in issuing short queries. However, we also found that the patent & trademark retrieval users used Boolean operators more than the typical web search users. By analyzing the multi-query sessions, we found that the users had five intentions in reformulating queries such as paraphrasing, specialization, generalization, alternation, and interruption, which were also used by the web search engine users.

A Ration Analysis of Quality, Satisfaction, and Additional Use Intention on Mobile Internet Service in Gender : Focus on Mobile Phone Users (성별 특성에 따른 무선인터넷 서비스 품질, 만족도, 추가사용 의도의 관계 분석 :휴대폰 사용자를 중심으로)

  • Lim, Se-Hun
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.1
    • /
    • pp.57-74
    • /
    • 2007
  • Since 1999, mobile internet service has been increasing rapidly. According to the Ministry of Information and Communication (MIC) of the Republic of Korea, the size of mobile service market is forecasted to be valued at approximately 10.5 trillion won in 2007. For this reason, many mobile service providers have adopted customer-centered strategy for the successful business in the mobile internet services. Thus, this research examines the rations of service quality, user satisfaction, and additional use intentions with 88 users (male and female) of mobile internet service using structural equation model (SEM). The result shows that there is a difference between male and female using mobile internet service regarding the quality factors of mobile internet service. This study provides some guidelines for the successful strategic planning of customer-centered mobile internet services in gender.

  • PDF

The Structure of Compatibility Beliefs In Mobile Entertainment Service Adoption

  • Kim, Gyeung-Min;Kim, Kihyun;Lee, Hyunjung
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.1
    • /
    • pp.217-240
    • /
    • 2013
  • Noting that compatibility beliefs are important antecedents of technology adoption, the objective of this study was to assess compatibility beliefs that affect users' intention to adopt a mobile entertainment service (MES). We developed a set of key compatibility beliefs: compatibility with life-style, compatibility with social meaning, and compatibility with past flow experiences. We then defined the key dimensions of each construct and developed operational measures for those dimensions. We tested the theorized effects of each of the compatibility constructs on MES adoption. The results support the effects of compatibility beliefs on users' intentions to adopt MES.

Analyzing the Impact of Value Satisfaction on Behavioral Intention to Use E-Resources

  • Kumar, Vinod;Garg, Ruchi Jain;Vandana, Vandana;Zia, Adil
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.3
    • /
    • pp.1-14
    • /
    • 2022
  • The present study investigates the impact of perceived value metrics in driving satisfaction and behavioral intention to use e-resource among its users. Utilitarian, hedonic, uniqueness, epistemic, and economic are key values selected for the purpose of investigation in the study. This empirical study is carried out through a survey and responses have been analyzed using structural equation modelling. The target group is selected by means of simple random sampling (users of e-resources in selected business schools). Findings of the study reveal that utilitarian values, hedonic values, epistemic values, and uniqueness values have a significant impact on the usage intention of e-resources; however, economic values reflect an insignificant relationship to intention to use e-resources. The study is a distinctive piece of work on investigating the most and the least significant value(s) associated with satisfaction and usage intentions of e-resources.

A Study of Pattern-based Gesture Interaction in Tabletop Environments (테이블탑 환경에서 패턴 기반의 제스처 인터렉션 방법 연구)

  • Kim, Gun-Hee;Cho, Hyun-Chul;Pei, Wen-Hua;Ha, Sung-Do;Park, Ji-Hyung
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.696-700
    • /
    • 2009
  • In this paper, we present a framework which enables users to interact naturally with hand gestures on a digital table. In general tabletop applications, one gesture is mapped to one function or command. Therefore, users should know these relations, and make predefined gestures as input. In contrast, users can make input gesture without cognitive load in our system. Instead of burdening users, the system possesses knowledge about gesture interaction, and infers proactively users' gestures and intentions. When users make a gesture on the digital surface, the system begins to analyze the gestures and designs the response according to users' intention.

  • PDF

Online Users' Password Security Behavior : The Effects of Fear Appeals and Message Framing, and Mechanism of Password Security Behavior (온라인 사용자의 비밀번호 보호행위 : 공포 소구와 메시지 프레이밍 효과, 그리고 비밀번호 보호행위의 동기요인)

  • Park, Jaeyoung;Kim, Jeondo;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.16 no.3
    • /
    • pp.147-165
    • /
    • 2017
  • Recently, there have been numerous issues about password breaches and it is becoming important for the users to manage their passwords. In practice, the online service provider are asking the online users to change their passwords periodically. However, majority of the users are not changing their passwords regularly, and this can increase the risk of password breach. The purpose of this study is to investigate whether 'fear appeals' and 'message framing' enhance the behavior of changing passwords by the online users. Furthermore, we identify the mechanism on how the behavior of changing passwords is enabled using protection motivation theory. The results of an online experiment show that the online users who are exposed to 'fear appeals' perceived a more vulnerability and severity of password breaches, which in turn, increased the intention of changing their password. In addition, we found that perceived severity of password breaches affect fear positively. Moreover, we found that fear has significant impact on the willingness of changing passwords. Finally, Message framing plays a moderating role between fear and change intentions. That is, in a situation where 'fear appeal' is presented, it means that 'gain framing' is more effective than 'loss framing' These findings suggest that the online service providers may need to use 'fear appeals' to the online users. Security managers can address issues related to the password breaches by carefully designing 'fear appeals'.

A Study on Factors Affecting Chinese Users' Willing to Pay for Online Paid Knowledge Contents: Focusing on Theory of Planned Behavior (중국 온라인 유료 지식 콘텐츠 구매의도에 영향을 미치는 요인: 계획된 행동이론(TPB)중심으로)

  • Jing, Jia;Lu, Chen
    • Journal of Digital Convergence
    • /
    • v.18 no.2
    • /
    • pp.151-162
    • /
    • 2020
  • In this paper, a research model was designed to investigate the factors affecting the purpose intentions to the online paid knowledge contents in China. The research model includes the contents characteristics, recognition of copyright, recognition of paid, the theory of planned behavior factors. In this research, the data was collected by online survey, and in final analysis, 457 users' questionnaires were used. The empirical paper proves research hypothesis by using SPSS 25.0 and AMOS 23.0. The results of the study are as follows: the contents characteristics partially give positive effects to attitude. In addition, recognition of paid and planning behavior theory factors have positive effects to purpose intentions. This paper provides a useful scheme to promotion the purpose of purchase for paid online knowledge contents.

The Relationship among Characteristics of Fashion Influencers, Relationship Immersion, and Purchase Intention

  • KIM, Juhyun;KIM, Naeeun;KIM, Mi-Sook
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.4
    • /
    • pp.35-51
    • /
    • 2021
  • Purpose: As the digital environment has expanded opportunity for consumers to acquire information from social media and social network services(SNS), With this environment, influencer has not only promoted products, but also participated in distribution and influencing on their followers. Despite the increasing interest in influencers, there has not been enough research on the structure of fashion influencer, relationship of immersion and purchase intention. This study examined the effects of fashion influencers' characteristics to the immersion of relationship with followers and purchase intention. Research design, data and methodology: For data collection, a pilot survey and the final survey were conducted. The pilot survey data was conducted to 50 female SNS users following fashion influencers. Based on the pilot tests, questionnaire was revised and the final survey was conducted online from august 22 to September 1, 2019 to female SNS users who have followed fashion influencer. A total of 408 data were collected, and exploratory factor analysis, correlation analysis, and structural equational modeling techniques were employed for the data analyses using AMOS 26.0 and SPSS 26.0. Results: First, five factors were extracted for the fashion influencers' characteristics: interactivity, similarity, reliability, expertise and attractiveness. Second, fashion influences' reliability, expertise, similarity, interactivity have a positive (+) effects on relationship immersion; however, attractiveness has no effect on relationship immersion with followers and fashion influencer. It was also determined that relationship immersion had positive (+) influences on purchase intention. The relationship immersion has been found to have a partially mediated effect and similarity has complete mediated effects between interactivity, reliability, and expertise of fashion influencers and purchasing intentions. In terms of fashion opinion leadership, it was found to have a significant influence on purchase intention only for low fashion leadership groups. Conclusions: The present study found the structural relationships among the influencer characteristics, relationship immersion and purchase intentions to provide framework for succeeding research. This research revealed academic association of intention of purchasing through use of fashion social media and fashion influencer marketing. The results also showed the practical implications that fashion influencers' expertise and reliability perceived by their followers are key determinants to success in influencer marketing.

A Study on Privacy Attitude and Protection Intent of MyData Users: The Effect of Privacy cynicism (마이데이터 이용자의 프라이버시 태도와 보호의도에 관한 연구: 프라이버시 냉소주의의 영향)

  • Jung, Hae-Jin;Lee, Jin-Hyuk
    • Informatization Policy
    • /
    • v.29 no.2
    • /
    • pp.37-65
    • /
    • 2022
  • This article analyzes the relationship between the privacy attitudes of MyData users and the four dimensions of privacy cynicism (distrust, uncertainty, powerlessness, and resignation) as to privacy protection intentions through a structural equation model. It was examined that MyData user's internet skills had a statistically significant negative effect on 'resignation' among the privacy cynicism dimensions. Secondly, privacy risks have a positive effect on 'distrust' in MyData operators, 'uncertainty' in privacy control, and 'powerlessness' in terms of privacy cynicism. Thirdly, it was analyzed that privacy concerns have a positive effect on the privacy cynicism dimensions of 'distrust' and 'uncertainty', with 'resignation' showing a negative effect. Fourthly, it was found that only 'resignation' as a dimension of privacy cynicism showed a negative effect on privacy protection intention. Overall, MyData user's internet skills was analyzed as a variable that could alleviate privacy cynicism. Privacy risks are a variable that reinforces privacy cynicism, and privacy concerns reinforce privacy cynicism. In terms of privacy cynicism, 'resignation' offsets privacy concerns and lowers privacy protection intentions.

What happens after IT adoption?: Role of habits, confirmation, and computer self-efficacy formed by the experiences of use (정보기술 수용 후 주관적 지각 형성: 사용 경험에서 형성된 습관, 기대일치, 자기효능감의 역할)

  • Kim, Yong-Young;Oh, Sang-Jo;Ahn, Joong-Ho;Jahng, Jung-Joo
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.25-51
    • /
    • 2008
  • Researchers have been continuously interested in the adoption of information technology (IT) since it is of great importance to the information systems success and it is also an important stage to the success. Adoption alone, however, does not ensure information systems success because it does not necessarily lead to achieving organizational or individual objectives. When an organization or an individual decide to adopt certain information technologies, they have objectives to accomplish by using those technologies. Adoption itself is not the ultimate goal. The period after adoption is when users continue to use IT and intended objectives can be accomplished. Therefore, continued IT use in the post-adoption period accounts more for the accomplishment of the objectives and thus information systems success. Previous studies also suggest that continued IT use in the post-adoption period is one of the important factors to improve long-term productivity. Despite the importance there are few empirical studies focusing on the user behavior of continued IT use in the post-adoption period. User behavior in the post-adoption period is different from that in the pre-adoption period. According to the technology acceptance model, which explains well about the IT adoption, users decide to adopt IT assessing the usefulness and the ease of use. After adoption, users are exposed to new experiences and they shape new beliefs different from the thoughts they had before. Users come to make decisions based on their experiences of IT use whether they will continue to use it or not. Most theories about the user behaviors in the pre-adoption period are limited in describing them after adoption since they do not consider user's experiences of using the adopted IT and the beliefs formed by those experiences. Therefore, in this study, we explore user's experiences and beliefs in the post-adoption period and examine how they affect user's intention to continue to use IT. Through deep literature reviews on the construction of subjective beliefs by experiences, we draw three meaningful constructs which theoretically have great impacts on the continued use of IT: perceived habit, confirmation, and computer self-efficacy. Then, we examine the role of the subjective beliefs on the cognitive/affective attitudes and intention to continue to use that IT. We set up a research model and conducted survey research. Since IT use implies interactions among a user, IT, and a task, we carefully selected the sample of users using same/similar IT to perform same/similar tasks, to exclude unwanted influences of other factors than subjective beliefs on the IT use. We also considered that the sample of users were able to make decisions to continue to use IT volitionally or at least quasi-volitionally. For each construct, we used measurement items recognized for reliability and widely used in the previous research. We slightly modified some items proper to the research context and a pilot test was carried out for forty users of a portal service in a university. We performed a full-scale survey after verifying the reliability of the measurement. The results show that the intention to continue to use IT is strongly influenced by cognitive/affective attitudes, perceived habits, and computer self-efficacy. Confirmation affects the intention to continue indirectly through cognitive/affective attitudes. All the constructs representing the subjective beliefs built by the experiences of IT use have direct and/or indirect impacts on the intention of users. The results also show that the attitudes in the post-adoption period are formed, at least partly, by the experiences of IT use and newly shaped beliefs after adoption. The findings suggest that subjective beliefs built by the experiences have deep impacts on the continued use. The results of the study signify that while experiencing IT in the post-adoption period users form new beliefs, attitudes, and intentions which may be different from those of the pre-adoption period. The results of this study partly demonstrate that the beliefs shaped by the behaviors, those are the experiences of IT use, influence users' attitudes and intention. The results also suggest that behaviors (experiences) also change attitudes while attitudes shape behaviors. If we combine the findings of this study with the results of the previous research on IT adoption, we can propose a cycle of IT adoption and use where behavior shapes attitude, the attitude forms new behavior, and that behavior shapes new attitude. Different from the previous research, the study focused on the user experience after IT adoption and empirically demonstrated the strong influence of the subjective beliefs formed in the post-adoption period on the continued use. This partly confirms the differences between attitudes in the pre-adoption and in the post-adoption period. Users continuously change their attitudes and intentions while experiencing (using) IT. Therefore, to make users adopt IT and to make them use IT after adoption is a different problem. To encourage users to use IT after adoption, experiential variables such as perceived habit, confirmation, and computer self-efficacy should be managed properly.