• Title/Summary/Keyword: Users'behavior

Search Result 1,644, Processing Time 0.025 seconds

The Nonlinear Association Between Internet Using Time for Non-Educational Purposes and Adolescent Health

  • Kim, Jong-Yeon
    • Journal of Preventive Medicine and Public Health
    • /
    • v.45 no.1
    • /
    • pp.37-46
    • /
    • 2012
  • Objectives: This study was performed to consider the association between Internet using time for non-educational purposes and adolescent health, and to examine how health status differs between Internet users and non-users. Methods: We analyzed 2009 data from the Korea Adolescent Risk Behavior Web-Based Survey, conducted on a nationally representative sample of students in grades 7 to 12. A total of 75 066 adolescents were categorized into four groups according to their Internet using time excluding using for educational purposes: non-Internet users (NIUs), occasional Internet users (OIUs) (<1 h/d), moderate Internet users (MIUs) (${\geq}1$ and <2 h/d), and heavy Internet users (HIUs) (${\geq}2$ h/d). Health factors included eight health risk behavior indices, four mental health indices and six physical health indices. Results: The distribution of Internet use was as follows: NIUs 17.4%, OIUs 68.1%, MIUs 12.7%, and HIUs 1.7%. In multivariate analysis, using OIUs as a reference, U- or J-shaped associations were observed for five health risk behavior indices (current smoking, current drinking, drug abuse, sexual intercourse, sedentary behavior on weekdays) and four mental health indices (stressed, depressed, suicidal ideation, attempted suicide) in both genders. After removing confounding effects, including age, region, school type, subjective school record, subjective economic status, presence of parents, living with family, and sedentary behavior, these associations were still observed. Conclusions: Health professionals should consider both Internet non-users (for non-educational purposes) and heavy users to be high-risk groups in terms of health status. Also, more well-designed studies are needed to clarify what factors are working in these nonlinear associations.

Utilization of Log Data Reflecting User Information-Seeking Behavior in the Digital Library

  • Lee, Seonhee;Lee, Jee Yeon
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.1
    • /
    • pp.73-88
    • /
    • 2022
  • This exploratory study aims to understand the potential of log data analysis and expand its utilization in user research methods. Transaction log data are records of electronic interactions that have occurred between users and web services, reflecting information-seeking behavior in the context of digital libraries where users interact with the service system during the search for information. Two ways were used to analyze South Korea's National Digital Science Library (NDSL) log data for three days, including 150,000 data: a log pattern analysis, and log context analysis using statistics. First, a pattern-based analysis examined the general paths of usage by logged and unlogged users. The correlation between paths was analyzed through a χ2 analysis. The subsequent log context analysis assessed 30 identified users' data using basic statistics and visualized the individual user information-seeking behavior while accessing NDSL. The visualization shows included 30 diverse paths for 30 cases. Log analysis provided insight into general and individual user information-seeking behavior. The results of log analysis can enhance the understanding of user actions. Therefore, it can be utilized as the basic data to improve the design of services and systems in the digital library to meet users' needs.

A Study on the Effect of Learning Activities and Feedback Seeking Behavior toward the End Users' Faithful Appropriation of Information Security System (조직내 최종사용자의 합목적적인 정보보호 시스템 사용 내재화와 학습, 피드백 추구 행동 연구)

  • Kim, Min Woong;Cheong, Ki Ju
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.117-146
    • /
    • 2016
  • Purpose The purpose of this paper is to examine factors and mechanism inducing end users' faithful appropriation of information security behavior through the information security system. This study is also trying to find out the role of Employees' adaptive activities like learning and feedback seeking behavior for the information security in organizations. Design/methodology/approach An empirical study was carried out with a sample of employees working in the financial service company. Employees(n = 268) completed a written questionnaire. Structural equation modeling was used to analyze the data. Findings Results indicated that employees' learning activities and feedback seeking behavior fully mediated the effect of major information security factors toward end users' faithfulness of appropriation of information security systems. In order to increase the level of employees information security behavior in accordance with security guideline, organizations should facilitate interactions that support the feedback seeking process between employees on information security awareness and behavior. Additionally, organizations may reinforce these behaviors by periodical training and adopting bounty hunter systems.

Social Media Performance: From the Perspective of Social Media Apathetic Behavior

  • Inwon Kang;Sungjoon Yoo
    • Journal of Korea Trade
    • /
    • v.26 no.3
    • /
    • pp.1-22
    • /
    • 2022
  • Purpose - Social media platforms have presented individuals with an opportunity to create and maintain their social relationship through the use of social media services. However, such social relationship has a negative influence on users' interest in social media. Design/methodology - Using structural equation modeling, this study seeks to examines the effects of different social media conflicts (individual and social conflicts) on users' psychological internal state, especially user apathetic behavior Findings - The findings confirm that, among social media conflicts, social-related conflict, especially social interaction overload has a negative effect on cognitive resonance, while individual conflict has the highest effect on cognitive dissonance. Also, cognitive dissonance has a much greater effect than cognitive resonance on user resistance, this means that users' negative perception of social media has a greater influence on their resistance. Lastly, user's resistance was found to have a positive influence on user's apathetic behavior. Originality/value - In other to capture social media Apathetic behavior, this study focus on social media conflict perspective, which includes social-related conflict and individual conflict, which are found to influence users' internal states towards social media and further induce social media behavior. This study is unique because it is among the first to explore social media apathetic behavior by focusing on the influence of both external social media conflict and internal state. Also, this study proposed that social related conflict has a higher negative influence on WeChat user than individual related conflict.

Wearable Device Users' Behavior Change: Does Persuasive Design Matter?

  • Wan, Lili;Zhang, Chao
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.218-225
    • /
    • 2020
  • Purpose Wearable devices are widely used in our daily life. The purpose of this study is to investigate the relationship between persuasive designs of fitness trackers and users' physical activity behavior. Methods To test the research model, data was collected from a web-based survey in China, resulting in an effective sample of 166 usable questionnaires. The survey was restricted only to respondents who wear a fitness tracker. Results The sample surveyed in this study indicated that half of the respondents had been wearing a smart fitness tracker shorter than one year, and only 27% were long-time users (longer than two years). Dialogue support and social support strategies were both proved to be effective in increasing users' workout behavior intention. Social support strategies had a greater effect on behavior change than dialogue support strategies. Conclusion The findings from this study make several contributions to the practice. Wearable devices developers can employ the result from this study to help them design devices, which can persuade people to do more exercises and preserve a healthier life.

Clothing Purchasing Behavior of Department Store Credit Card Users according to Fashion Lifestyle (백화점카드 이용자의 패션라이프스타일에 따른 의복구매행동)

  • Yu, Eun-Jeong;Ku, Yang-Suk
    • Fashion & Textile Research Journal
    • /
    • v.4 no.1
    • /
    • pp.40-46
    • /
    • 2002
  • The purpose of this study was to classify the clothing purchasing behavior of department store credit card users according to fashion lifestyle. The questionnaire was administrated to 346 female department store credit card users aged over 20 living in Daegu, Frequency factor analysis, cluster analysis, one-way Analysis of Variance (ANA), MANOVA, Scheffe test, ${\chi}^2$-test and t-test were used for satistical analysis. The consumers' lifestyle was classified by fashion oriented, practical and self conspicuous. The results showed that the credit card users' clothing purchasing behavior was different according to the fashion lifestyle. The self conspicuous group showed the highest score in impulse buying.

Information Behavior on Social Live Streaming Services

  • Scheibe, Katrin;Fietkiewicz, Kaja J.;Stock, Wolfgang G.
    • Journal of Information Science Theory and Practice
    • /
    • v.4 no.2
    • /
    • pp.6-20
    • /
    • 2016
  • In the last few years, a new type of synchronous social networking services (SNSs) has emerged—social live streaming services (SLSSs). Studying SLSSs is a new and exciting research field in information science. What information behaviors do users of live streaming platforms exhibit? In our empirical study we analyzed information production behavior (i.e., broadcasting) as well as information reception behavior (watching streams and commenting on them). We conducted two quantitative investigations, namely an online survey with YouNow users (N = 123) and observations of live streams on YouNow (N = 434). YouNow is a service with video streams mostly made by adolescents for adolescents. YouNow users like to watch streams, to chat while watching, and to reward performers by using emoticons. While broadcasting, there is no anonymity (as in nearly all other WWW services). Synchronous SNSs remind us of the film The Truman Show, as anyone has the chance to consciously broadcast his or her own life real-time.

Study on Social Network Service(SNS) Users' Privacy Protection Behavior : Focusing on the protection motivation theory (소셜 네트워크 서비스(SNS) 이용자들의 개인정보보호 행동에 관한 연구: 보호동기이론을 중심으로)

  • Kim, Jung-Eun;Kim, Seong-Jun;Kwon, Do-Soon
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.1-30
    • /
    • 2016
  • Purpose The purpose of this study is to grasp the factors influencing domestic SNS users' privacy protection behavior and verify their relationship through self-efficacy and responsiveness. Thus, this study tries to suggest efficient and effective measures for SNS personal information protection. Design/methodology/approach To this end, with main variables of the protection motivation theory based on the assumption that when users are exposed to the threat to their health, they would have protection motivation and change their behavior of protecting their health, a research model was suggested. In addition, in order to empirically verify the research model, a survey was performed targeting general college students having the experience of using SNS. Findings As a result of the analysis, first, perceived effectiveness and self-efficacy had a positive effect on responsiveness. Second, perceived barrier had a positive effect on self-efficacy. Third, self-efficacy and responsiveness had a positive effect on privacy protection behavior. This study is expected to contribute to establishing an effective guideline for measures that could induce SNS users' privacy protection behavior.

Online Users' Password Security Behavior : The Effects of Fear Appeals and Message Framing, and Mechanism of Password Security Behavior (온라인 사용자의 비밀번호 보호행위 : 공포 소구와 메시지 프레이밍 효과, 그리고 비밀번호 보호행위의 동기요인)

  • Park, Jaeyoung;Kim, Jeondo;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.16 no.3
    • /
    • pp.147-165
    • /
    • 2017
  • Recently, there have been numerous issues about password breaches and it is becoming important for the users to manage their passwords. In practice, the online service provider are asking the online users to change their passwords periodically. However, majority of the users are not changing their passwords regularly, and this can increase the risk of password breach. The purpose of this study is to investigate whether 'fear appeals' and 'message framing' enhance the behavior of changing passwords by the online users. Furthermore, we identify the mechanism on how the behavior of changing passwords is enabled using protection motivation theory. The results of an online experiment show that the online users who are exposed to 'fear appeals' perceived a more vulnerability and severity of password breaches, which in turn, increased the intention of changing their password. In addition, we found that perceived severity of password breaches affect fear positively. Moreover, we found that fear has significant impact on the willingness of changing passwords. Finally, Message framing plays a moderating role between fear and change intentions. That is, in a situation where 'fear appeal' is presented, it means that 'gain framing' is more effective than 'loss framing' These findings suggest that the online service providers may need to use 'fear appeals' to the online users. Security managers can address issues related to the password breaches by carefully designing 'fear appeals'.

The Structural Relationships among Information Security Threat Factors and Information Protection Behavior of the FinTech Services: Focus on Theoretical Perspectives of Technology Threat Avoidance and Health Protective Behaviors (핀테크(FinTech) 서비스의 정보보안 위협요인과 개인정보보호행위와의 구조적 관계에 관한 연구: 기술위협회피와 건강행동이론 관점에서)

  • Bae, Jae Kwon
    • The Journal of Information Systems
    • /
    • v.26 no.3
    • /
    • pp.313-337
    • /
    • 2017
  • Purpose Financial technology, also known as FinTech, is conceptually defined as a new type of financial service which is combined with information technology and other traditional financial services like payments, investments, financing, insurance, asset management and so on. Most of the studies on FinTech services have been conducted from the viewpoint of technical issues or legal and institutional studies, and few studies are conducted from the health belief perspectives and security behavior approaches. In this regard, this study suggest an extended information protection behavior model. Design/Methodology/Approach The Health Belief Model (HBM), the Protection Motivation Theory (PMT), and the Technology Threat Avoidance Theory (TTAT) were employed to identify constructs relevant to information protection behavior of FinTech services. A new extended information protection behavior model in which the influence factors of information protection behavior (i.e., perceived susceptibility, perceived severity, perceived benefits, perceived barriers, perceived self-efficacy, subjective norms) affect perceived threats and perceived responsiveness positively, leading to information protection behavior of FinTech users eventually. This study developed an extended information protection behavior model to explain the protection behavior intention in FinTech users and collected 272 survey responses from the mobile users who had experiences with such mobile payments and FinTech services. Findings The finding of this study suggests that the influence factors of information protection behavior affect perceived threats and perceived responsiveness positively, and information protection behavior of FinTech users as well.