• Title/Summary/Keyword: context model

Search Result 2,771, Processing Time 0.031 seconds

An Integrated Model of CSR Perception and TAM on Intention to Adopt Mobile Banking

  • NGUYEN, Van Anh;NGUYEN, Thi Phuong Thao
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.1073-1087
    • /
    • 2020
  • The purpose of this paper is to (1) evaluate a proposed conceptual model based on integrated Technology Acceptance Model (TAM) and Corporate Social Responsibility (CSR); (2) compare the differences between Vietnam and South Korea regarding the effects of consumer perception of CSR activities and technology acceptance on intention to adopt mobile banking. Structural Equation Modeling (SEM) was conducted to analyze the data collected from the field survey questionnaires administered to a convenience sample of Vietnamese and Korean banking customers. The results showed that there is a difference between South Korea and Vietnam with regard to intention to use mobile banking services. While the effects of social responsibility and environmental responsibility on trust, trust on perceived usefulness, perceived risk on intention to use, perceived usefulness on intention to use were significant in the context of Vietnam but those effects were not significant in South Korea. Therefore, this study has attempted to fill this gap by empirically examining some of the important factors influencing the adoption of m-banking from the Vietnamese and Korean customers' perspectives. Finally, practical and theoretical implications for both banks and researchers in the m- banking context are also discussed in the concluding section.

Implementation of Role Based Access Control Model for U-healthcare (유비쿼터스 헬스케어를 위한 역할 기반 접근제어 모델의 구현)

  • Lee, You-Ri;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.6
    • /
    • pp.1256-1264
    • /
    • 2009
  • When unapproved users access to healthcare system and use medical information for other malicious purposes, it could severely threaten important information related to patients' life, because in ubiquitous environment healthcare service makes patient's various examination results, medical records or most information of a patient into data. Therefore, to solve these problems, we design RBAC(Role Based Access Control) for U-healthcare that can access control with location, time and context-awareness information like status information of user and protect patient's privacy. With implementation of the proposed model, we verify effectiveness of the access control model for healthcare in ubiquitous environment.

A model of Worksheets with Various Levels Considering Contexts and Inquiry of the Learning Tasks for Elementary Science Classes (학습 과제의 맥락과 탐구의 수준을 고려한 자연과 학습지 모형)

  • Lee, Myeong-Je;Lee, Je-Yong
    • Journal of The Korean Association For Science Education
    • /
    • v.19 no.3
    • /
    • pp.448-460
    • /
    • 1999
  • Worksheets with various levels are major instructional material in open classroom, but sometimes they have been arbitrarily developed in elementaryschools. Especially, pedagogical elements of science course seem to have been neglected in developing science learning papers. To solve these problems, a model of worksheets was developed considering the contextual nature of science knowledge and educational constructivism. The frame of this model is composed of inquiry skill and context, which are two dimensions of each learning task. The level of each worksheet was determined by the level of inquiry skills and the familiarity of contexts.

  • PDF

A Study on TAM(Technology Acceptance Model) for Individualized Virtual Community (개인형 커뮤니티에 대한 기술수용 모델 적용에 관한 연구)

  • Moon, Hyoung-Do;Kim, Jun-Woo;Kim, Yon-Soo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.1
    • /
    • pp.11-20
    • /
    • 2008
  • The purpose of this study is to identify the factors determining users' acceptance of individualized virtual community. While there has been considerable research on the Technology Acceptance Model (TAM) that has predicted whether individuals will accept and voluntarily use information systems, limitations of the TAM include the omission of an important characteristics of individual construct in the context of individualized community. Based on literature relating to the theory of reasoned action (TRA), the theory of planned behavior (TPB) and the TAM, this study extends the applicability of the TAM in a individualized community context, by adding characteristics of individual-based construct ("subjective norm", "self-efficacy", "self-presentation" and "sharing information to exchange various information") to the model. Analysis was conducted on using the structural equation modeling approach. The result supports the extended TAM in predicting users' intentions to using personalized community. Several implications for IT/IS acceptance research and individualized community service management practices are discussed.

Customer Loyalty and Logistics Service Performance in Maritime Transport : A Literature Review and Conceptual Model

  • Jang, Hyun Mi;Kim, Sang Youl
    • Journal of Navigation and Port Research
    • /
    • v.36 no.9
    • /
    • pp.753-761
    • /
    • 2012
  • To achieve a differential advantage over competitors and protect their long-term interest, shipping lines have striven to find ways to maintain an ongoing relationship with shippers which can be achieved by attaining their loyalty. The benefits of loyal shippers are potentially huge in that they generate long-term revenue streams as well as provide cost savings as compared with attracting new shippers. Logistics service provided by shipping lines is identified as one of the effective tools for building customer loyalty. However, in a review of the literature none of the studies examine how logistics service creates customer loyalty, particularly between shipping lines and shippers. Consequently, the overarching purpose of this paper is to extend knowledge on logistics service performance and its relationship with customer loyalty in the unique context of maritime transport by proposing a new conceptual model based on an extensive literature review. The major contribution is to offer a new insight into the complex relationships between those 'soft' concepts in the context of maritime transport.

Privacy Level Indicating Data Leakage Prevention System

  • Kim, Jinhyung;Park, Choonsik;Hwang, Jun;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.558-575
    • /
    • 2013
  • The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet exchanges between internal systems and the Internet, filters packets according to the data security policy defined by each company, or discretionarily deletes important data included in packets in order to prevent leakage of corporate information. However, the problem arises that the system may monitor employees' personal information, thus allowing their privacy to be violated. Therefore, it is necessary to find not only a solution for detecting leakage of significant information, but also a way to minimize the leakage of internal users' personal information. In this paper, we propose two models for representing the level of personal information disclosure during data leakage detection. One model measures only the disclosure frequencies of keywords that are defined as personal data. These frequencies are used to indicate the privacy violation level. The other model represents the context of privacy violation using a private data matrix. Each row of the matrix represents the disclosure counts for personal data keywords in a given time period, and each column represents the disclosure count of a certain keyword during the entire observation interval. Using the suggested matrix model, we can represent an abstracted context of the privacy violation situation. Experiments on the privacy violation situation to demonstrate the usability of the suggested models are also presented.

Empirical Comparison of Word Similarity Measures Based on Co-Occurrence, Context, and a Vector Space Model

  • Kadowaki, Natsuki;Kishida, Kazuaki
    • Journal of Information Science Theory and Practice
    • /
    • v.8 no.2
    • /
    • pp.6-17
    • /
    • 2020
  • Word similarity is often measured to enhance system performance in the information retrieval field and other related areas. This paper reports on an experimental comparison of values for word similarity measures that were computed based on 50 intentionally selected words from a Reuters corpus. There were three targets, including (1) co-occurrence-based similarity measures (for which a co-occurrence frequency is counted as the number of documents or sentences), (2) context-based distributional similarity measures obtained from a latent Dirichlet allocation (LDA), nonnegative matrix factorization (NMF), and Word2Vec algorithm, and (3) similarity measures computed from the tf-idf weights of each word according to a vector space model (VSM). Here, a Pearson correlation coefficient for a pair of VSM-based similarity measures and co-occurrence-based similarity measures according to the number of documents was highest. Group-average agglomerative hierarchical clustering was also applied to similarity matrices computed by individual measures. An evaluation of the cluster sets according to an answer set revealed that VSM- and LDA-based similarity measures performed best.

Design of User Privacy Model for Strong Reliability in SNS Environment (SNS 환경에서 신뢰성이 강한 사용자 프라이버시 모델 설계)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.237-242
    • /
    • 2013
  • SNS is emerging as an academic and social interest, as Facebook and Twitter are developed explosively. But, SNS has a problem of exposing user's privacy because it is originated by exchanging user's personal information and opinion. This paper proposes SNS user privacy protecting model using data separation and false data information instead of blocking which is using to protect user's personal privacy. The proposed model do not let the third party extract precise information after collecting user's context information by adding false information to separated context information. Also, it gets user's agreement beforehand if SNS service provider uses user's information not to be used illegally by the third party.

How Resilience Affects Employee Engagement? A Case Study in Indonesia

  • AMIR, Muhammad Taufiq;MANGUNDJAYA, Wustari L.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.1147-1156
    • /
    • 2021
  • This study aims to examine the role of resilience in academic engagement and also to evaluate the theoretical model of the relationships between resilience and engagement. A survey of faculty members in 20 study programs from 12 universities in Jakarta was conducted, Where 247 questionnaires were returned from the 495 distributed. Furthermore, 240 valid data were available for evaluation in order to test the model, and a confirmatory Structural Equation Modelling was conducted, using AMOS 20. Criteria of goodness-fit demonstrated the relatively adequate model, and the coefficient of structural path describes the potential of the links. Three out of four paths available significantly showed the role of developmental persistency and positive emotions on work engagement. The participants of the study include only constituted academics of private universities in Indonesia. Thus there is a need for better care in interpreting the level of resilience and engagement, as engagement may vary when used in a different context. The study suggests interventions for practitioners, not only for academia in the higher education context but also for other professionals in managing engagement at the individual or team level. Therefore, combining resilience and engagement programs may contribute to an enhancement in the productivity of employees.

Development of ASEAN Network Model on Information Literacy

  • Sacchanand, Chutima
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.1
    • /
    • pp.18-29
    • /
    • 2022
  • This study aimed at overviewing the situation of information literacy education and research in the Association of Southeast Asian Nations (ASEAN) region, and developing an ASEAN network model on information literacy. This research used documentary and qualitative research methods. Key resources consisted of twenty bibliometric studies and related documents and two groups of key persons. The first group consisted of twenty-seven purposive key persons from eight countries, and the second group consisted of seven key persons from five countries. The research instruments comprised a data collection form and focus group/ interviewing forms. Data was collected by focus group discussion and online interviews, and qualitative content analysis was used in data analysis and presented descriptively. Research findings showed that: 1) information literacy education and research in the ASEAN region varied across countries and placed importance on the educational context. Singapore was found to be the most leading and productive country in ASEAN in information literacy with the highest number of journal articles on the international scale, and was among the most contributing groups at the regional and global level; 2) the ASEAN Network on Information Literacy (ASEAN-NIL) has been developed as a model with its principles, objectives, management system, activities, and promotion strategies. Its strengths are an integrated scope, multidimensional orientation, and interdisciplinary and collaborative partnerships at the national, regional, and international level, suitable for the ASEAN context, the online environment, and the digital educational ecosystem.