• Title/Summary/Keyword: information behavior model

Search Result 2,073, Processing Time 0.034 seconds

Layered Object and Script Language Model for Avatar Behavior Scenario Generation (아바타 행위 시나리오 생성을 위한 계층적 객체 및 스크립트 언어 모델)

  • Kim, Jae-Kyung;Sohn, Won-Sung;Lim, Soon-Bum;Choy, Yoon-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.1
    • /
    • pp.61-75
    • /
    • 2008
  • A script language, which represents and controls avatar behaviors in a natural language style, is especially remarkable, because it can provide a fast and easy way to develop an animation scenario script. However, the studies that consider avatar behavior interactions with various virtual objects and intuitive interface techniques to design scenario script have been lack. Therefore, we proposed a context-based avatar-object behavior model and layered script language. The model defines context-based elements to solve ambiguity problems that occur in abstract behavior interface and it provides user interface to control avatar in the object-based approach. Also, the proposed avatar behavior script language consisted of a layered structure that represents domain user interface, motion sequence, and implement environment information at each level. Using the proposed methods, the user can conveniently and quickly design an avatar-object behavior scenario script.

  • PDF

Trust, Perceived Risk, and Trusting Behavior in Internet Banking

  • Kim, Kyung-Kyu;Prabhakar, Bipin;Park, Sung-Kook
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.1-23
    • /
    • 2009
  • In information systems, "trust" and "risk" have been explored by a few trust-related research studies before, but as two separate issues. The way in which these studies have been designed, however, does not help clarify the relationship between trust and risk since they are studied as unconnected determinants of trusting behavior in electronic commerce. As such, this research attempts to examine and specify the relationships among the core constructs surrounding the issue of trust such as risk and trusting behavior. The context of Internet banking adoption is used to develop a conceptual model that incorporates the direct effects of trust and perceived risk on trusting behavior as well as the mediation of the relationship between trust and trusting behavior by perceived risk. The findings show that perceived risk mediates the relationship between trust and trusting behavior. Specifically, trust in the Internet as a banking medium significantly influences the adoption of Internet banking both directly and indirectly through perceived risk of Internet banking. Trust that the bank will not take advantage of consumers significantly influences the trusting behavior through perceived risk of Internet banking. This study, thus, extends research on trust in e-commerce by simultaneously examining the influence of trust and perceived risk on e-commerce adoption.

A Study on the Causal Model of Computer Self-Efficacy - using on LISREL Analysis - (최종사용자의 Computer Self-Efficacy에 관한 인과모형에 대한 연구 -LISREL분석 접근법을 이용하여-)

  • Shin Mi-Hyang
    • Management & Information Systems Review
    • /
    • v.2
    • /
    • pp.267-294
    • /
    • 1998
  • Recently, self-efficacy is one of the critical constructs that have been found to influence human decisions about behavior selection and the performance associated with the selected behavior. The construct has been widely adopted and tested In the fields of social psychology and/or other behavioral sciences. In information systems field, however, it has been hardly studied, although computer self-efficacy could have been an important factor explaining and predicting human computer usage behaviors. From this perspective, main purposes of the study is to understand causal relation among the factors influencing computer self- efficacy, computer usage behavior and computer self-efficacy. The research reported in this study have several objectives; 1) to develop a measure of computer self-efficacy, 2) to Identify the factors influencing self-efficacy, and 3) to reveal the relationship between self-efficacy and computer usage behavior and then 4) to explain the causal model of computer self-efficacy. By reviewing the literature, past experience, others' use, encouragement by others, and anxiety are selected as the factors influencing computer self-efficacy. Four hypotheses concerning the relationship between each of the variables and computer self-efficacy are tested by LISREL. One more hypothesis about the relationship between computer self-efficacy and computer usage is also tested. The results show that computer self-efficacy is significantly influence by computer anxiety, encouragement by others, and computer experience, and that it is closely correlated with computer usage behavior.

  • PDF

A Prospective Model of Behavior of Physical and Occupational Therapists of The Confidentiality of Patient Medical records by Structural Equation Model (구조모형방정식을 이용한 물리치료사와 작업치료사의 환자의료정보 보호행동 예측모형 개발)

  • Lee, I.H.;Park, H.J.;Yun, K.I.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.4 no.1
    • /
    • pp.71-80
    • /
    • 2010
  • This study developed the perspective model of behavior of physical therapists(PTs) and occupational therapists(OTs) who are dealing with confidential patient medical information in hospitals. Theory of planned Behavior(TpB) model, expanded models 1 and 2 that add habit, social pressure, and work convenience concept to TpB are tested for the validity in explaining the preposing factors that affect the behavior of PTs and OTs in ensuring the confidentiality of patient medical records. Data were collected by administrating a survey to the 120 PTs and OTs in A city. Of the 120 questionaries distributed, 110 were responded resulting 91.6% of response rate. There were not significantly different among the group classified by age, 'clinical career, gender, work family, and education level were analysis using with Independent t test and one-way ANOVA. The relationships on the concepts suggested in the models were analysed by applying the Structured Equations Modeling methods. The results of Structured Equations analysis showed that expanded model 2 was more effective model than TpB model and expanded model 1.

The Effect of Organizational Information Security Environment on the Compliance Intention of Employee (조직의 정보보안 환경이 조직구성원의 보안 준수의도에 미치는 영향)

  • Hwang, Inho;Kim, Daejin
    • The Journal of Information Systems
    • /
    • v.25 no.2
    • /
    • pp.51-77
    • /
    • 2016
  • Purpose Organizations invest significant portions of their budgets in fortifying information security. Nevertheless, the security threats by employees are still at large. We discuss methods to reduce security threats that are posed by employees in organization. This study finds antecedent factors that increases or decreases employee's compliance intention. Also, the study suggests organizations' security environmental factors which influences the antecedent factors of compliance intention. Design/methodology/approach The structural equation model is then applied in order to verify this research model and hypothesis. Data were collected on 415 employees working in organizations with an implemented information security policy in South Korea. We analyzed the fitness and validity of the research model via confirmatory factor analysis in order to verify the research hypothesis, then we analyzed structural model, and derived the result. Findings The result shows that organizational commitment and peer behavior increase security compliance intention of employees, while security system anxiety decreases compliance intention. And, organization's physical security system and security communication both have influence on antecedent factors for information security compliance of employees. Our findings help organizations to establish information security strategies that enhance employee security compliance intention.

Using Skeleton Vector Information and RNN Learning Behavior Recognition Algorithm (스켈레톤 벡터 정보와 RNN 학습을 이용한 행동인식 알고리즘)

  • Kim, Mi-Kyung;Cha, Eui-Young
    • Journal of Broadcast Engineering
    • /
    • v.23 no.5
    • /
    • pp.598-605
    • /
    • 2018
  • Behavior awareness is a technology that recognizes human behavior through data and can be used in applications such as risk behavior through video surveillance systems. Conventional behavior recognition algorithms have been performed using the 2D camera image device or multi-mode sensor or multi-view or 3D equipment. When two-dimensional data was used, the recognition rate was low in the behavior recognition of the three-dimensional space, and other methods were difficult due to the complicated equipment configuration and the expensive additional equipment. In this paper, we propose a method of recognizing human behavior using only CCTV images without additional equipment using only RGB and depth information. First, the skeleton extraction algorithm is applied to extract points of joints and body parts. We apply the equations to transform the vector including the displacement vector and the relational vector, and study the continuous vector data through the RNN model. As a result of applying the learned model to various data sets and confirming the accuracy of the behavior recognition, the performance similar to that of the existing algorithm using the 3D information can be verified only by the 2D information.

A Preliminary Research on the Impact of Perception of Personal Information Leakage Incidents on the Behavior of Individual Information Management in the Mobile Banking Contexts (모바일 뱅킹 이용자의 개인정보 유출사고 인지가 개인정보관리 준수행동에 미치는 영향에 대한 사전 연구)

  • Kim, Jungduk;Lim, Se-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.735-744
    • /
    • 2016
  • Recently, personal information leakage incidents with increased usage of mobile services are increasing. Personal information leakage incidents can have a significant impact on an individual's mobile banking services. Accordingly, we examine relationships among individual's psychological characteristics, intention and behavior regarding compliance in an individual's perception on personal information leakage incidents in mobile banking contexts. In this study, for explaining our research model and understanding with personal psychology and behavior in mobile banking contexts, we adopted two theories, theory of interpersonal behavior and stimulus-response theory. We collected the 55 data using online surveyor and then analyzed structural equation model in order to find causal relationships among research variables. The results of this study should be useful to the mobile banking services companies in promoting service users to follow the information privacy policies.

ISRI - Information Systems Research Constructs and Indicators: A Web Tool for Information Systems Researchers

  • Varajao, Joao;Trigo, Antonio;Silva, Tiago
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.1
    • /
    • pp.54-67
    • /
    • 2021
  • This paper presents the ISRI (Information Systems Research Indicators) Web tool, publicly and freely available at isri.sciencesphere.org. Targeting Information Systems (IS) researchers, it compiles and organizes IS adoption and use theories/models, constructs, and indicators (measuring variables) available in the scientific literature. Aiming to support the IS theory development process, the purpose of ISRI is to gather and systematize information on research indicators to help researchers and practitioners' work. The tool currently covers eleven theories/models: DeLone and McLean's IS Success Model (D&M ISS); Diffusion of Innovations Theory (DOI); Motivational Model (MM); Social Cognitive Theory (SCT); Task-Technology Fit (TTF); Technology Acceptance Model (TAM); Technology-Organization-Environment Framework (TOE); Theory of Planned Behavior (TPB); Decomposed Theory of Planned Behavior (DTPB); Theory of Reasoned Action (TRA); and Unified Theory of Acceptance and Use of Technology (UTAUT). It also includes currently over 400 constructs, nearly 2,500 indicators, and about 60 application contexts related to the models. For the creation of the tool's database, nearly 580 references were used.

A Study of Cross-Border E-Consumers' Cunning Behavior from the Perspective of Situational Action Theory

  • Kyumin Hwang;Gee-Woo Bock;Han-Min Kim
    • Asia pacific journal of information systems
    • /
    • v.31 no.4
    • /
    • pp.633-673
    • /
    • 2021
  • Due to the differences between and distinct consumer perceptions of domestic and cross-border e-commerce (CBEC), e-consumer misconduct, which we call "cunning behavior," has emerged. This study examines cunning behavior in CBEC and compares e-consumer perceptions about environmental factors and their own personal traits using a vignette experiment and survey. The vignettes of this study were developed for three situations: illegal, deviant, and unethical behavior. Drawing on vignettes, we collected survey data and then examined the research model using the analysis of moment structure statistical tool. The results show that perceived benefit and past experience with CBEC are strong triggers for cunning behavior, while the ability to exercise self-control restrains this behavior. This study provides an understanding of why cunning behavior occurs in the CBEC context and describes different cunning behavior types.

Herding Behavior Model in Investment Decision on Emerging Markets: Experimental in Indonesia

  • RAHAYU, Sri;ROHMAN, Abdul;HARTO, Puji
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.1
    • /
    • pp.53-59
    • /
    • 2021
  • This research aims to examine the model of investor herding behavior in making investment decisions in the Indonesian capital market, which is influenced by social and information impacting on the value of the Book Value Per Share (BVPS). The latest stock market conditions show that most investors make the same error pattern in making investment decisions that result in losses. The experiment involves two independent variables, namely, information about BVPS and social influence. This study used a 2×2 factorial design laboratory experimental method. Data collection was carried out through treatment of a sample of 100 individual investors listed on the Indonesia Stock Exchange. Univariate Two-Way Analysis of Variance (ANOVA) statistical tool was used to test the independent variable on the dependent variable. Research results showed that the social influence originating from expert investors is more influential than the Book Value Per Share (BVPS) information on the behavior of herding investors in making investment decisions. These findings suggest that investors know their psychological factors, thereby increasing self-control and investment analysis skills. Further research can use psychological bias and other indicators of accounting relevant information such as Earning Per Share (EPS) to test herding behavior in investment decision making in the capital market.