• Title/Summary/Keyword: protection motivation

Search Result 102, Processing Time 0.029 seconds

Improving the Use of Hearing Protectors through Motivation (동기부여를 통한 청각 보호구 사용증대 방안)

  • Min-Yong Park
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.18 no.33
    • /
    • pp.135-141
    • /
    • 1995
  • Hearing protection devices (HPDs) are currently the most common countermeasure against occupational noise-induced hearing loss. Use of HPD is only effective when they are properly Worn. However, industrial workers often do not very them, posing a serious under protection. This paper analyzes several motivational strategies which might be applied improve HPD use in the field. It was concluded that such methods could readily be implemented in the workplace to protect workers exposed to hazardous industrial noises.

  • PDF

Smart IoT Service Users' Compliance with Personal Information Protection Behavior: An Empirical Study on the Message Design Features to Induce Installation of Software Updates (스마트 IoT 서비스 사용자의 개인정보 보호 행동 준수: 소프트웨어 업데이트 유도를 위한 메세지 디자인 특성에 관한 실증 연구)

  • Lee, Ho-Jin;Kim, Hyung-Jin;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.31 no.2
    • /
    • pp.82-104
    • /
    • 2024
  • Smart home services are growing rapidly as the development of the Internet of Things (IoT) opens the era of the so-called "Connected Living." Although personal information leaks through smart home cameras are increasing, however, users-while concerned-tend to take passive measures to protect their personal information. This study theoretically explained and verified how to design effective software update notification messages for smart home cameras to ensure that users comply with the recommended security behavior (i.e., update installation). In a survey experiment participated in by 120 actual users, the effectiveness of both emotional appeals (i.e., security breach warning images for fear appeals) and rational appeals (i.e., loss-framed messages emphasizing the negative consequences of not installing the updates) were confirmed. The results of this study provide theoretical interpretations and practical guidelines on the message design features that are effective for threat appraisals (i.e., severity, vulnerability) of smart home camera users and their protection motivation.

A Study of Indonesian Online Marketplace: Information Processing Theory Paradigm

  • TEOFILUS, Teofilus;SUTRISNO, Timotius F.C.W.;HONGDIYANTO, Charly;WANANDA, Veronica
    • Journal of Distribution Science
    • /
    • v.18 no.8
    • /
    • pp.75-87
    • /
    • 2020
  • Purpose: This study uses the protection motivation theory and information processing theory to discuss the high number of fraud phenomenon in Indonesia which causes worries to the internet users. The second problem is the large amount of information transparency in e-commerce which actually hinders the users in making decisions so it causes a negative behavior pattern, namely discontinue usage intention. Design/methodology: Therefore, this research hopes to provide insight to the online or e-commerce business community, especially for Tokopedia, to develop its business from understanding the factors influencing consumer attitude when shopping online. The sample are students from Universitas Indonesia, Institut Teknologi Bandung, Institut Pertanian Bogor, Universitas Gadjah Mada and Institut Teknologi Surabaya, with total 900 respondents. Result: The results of this research indicate that ubiquitous connectivity (UC) variable significantly affects variables such as the privacy concern (PC), information transparency (IT) and information overload (IO). PC and IO variables also significantly affect Discontinue Usage Intention (DUI). Conclusion: This study gives a new perspective that despite the phenomenon, the millennial generation especially are not entirely concerned about the privacy concern, however, this study clearly shows that the privacy issue in the digital word continues to be something that needs to be cared for.

Differences in Diet-Related Attitudes and Demographics by Type of Food-Lifestyle: Focused on Adults in Their 20s and 30s (식생활 라이프스타일 유형에 따른 다이어트 관련 태도와 인구 통계학적 특성의 차이분석: 20, 30대 성인을 중심으로)

  • Park, Kwang Hee
    • Human Ecology Research
    • /
    • v.53 no.6
    • /
    • pp.655-665
    • /
    • 2015
  • This study classified respondents by food-lifestyle and investigated differences in diet-related attitudes and demographic variables among food-lifestyle groups. Diet-related attitudes consisted of variables such as interest in diet, trial number of diet, diet period, weight loss, diet motivation, verification of products approved by the Ministry of Food and Drug Safety, verification of manufacturer's reliability, examination of damage cases and side effects, and awareness of consumer protection law. This study administered a questionnaire survey to adults between the ages of 20 and 39 who lived in Daegu and Uijeongbu from November 17th to December 14th 2014. Data collected from 293 respondents were analyzed using descriptive statistics, factor analyses, cluster analysis, analysis of variance (ANOVA) and chi-square tests. Four clusters (passive eating habit group, active eating habit group, convenience oriented group, and taste and health oriented group) were developed according to four factors of food-lifestyle (health-conscious, popularity-seeking, taste-seeking, convenience-seeking). The results of the ANOVA and chi-square tests indicated significant differences in interest in diet, awareness of consumer protection law, verification of products approved by the Ministry of Food and Drug Safety, verification of manufacturer's reliability, examination of damage cases and side effects, gender, education levels and household monthly income levels among food-lifestyle groups.

Information Security Importance Perception: Protection Motivation Theory Perpectives (정보보안 중요성 인식에 관한 연구: 예방동기이론 관점에서)

  • Yim, Myung-Seong
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.1
    • /
    • pp.283-295
    • /
    • 2022
  • This study attempts to explore factors that influence the perception of importance of information security. Three possible exogenous variables including perceived certainty of punishment, perceived response cost, and acquiescense are suggested that are based on the protectiom motivation theory. As a result, we found followings. First, The perceived punishment certainty has a significant effect on the perceived importance of information security. Also, it influences a negative effect on acquiescence. Second, the response cost has a negative effect on the perceived importance of information security. In addition, the response cost positively effects on acquiescence. Finally, acquiescence negatively influences on the perceived importance of information security. The results show that, in order to increase the perceived importance of information security among employees, it is necessary to make them aware that a security violation can result in certain punishment. At the same time, organizations should also attempt to remove major obstacles accompanying security behaviors of employees. Finally, organizations encourage open communication relating to information security among employees.

A Conjoint Analysis of Online Information Privacy Concerns: A case in Korea (온라인 프라이버시 침해 우려에 관한 컨조인트 분석 : 한국에서의 사례)

  • Choi, Mi-Young;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.45-65
    • /
    • 2008
  • The rapid growth of the Internet has increased the amount of transmission of personally identifiable information. At the same time, with new Internet related technologies, organizations are trying to collect and access more personal information than before, which in turn makes individuals concern more about their information privacy. For their successful businesses, organizations have tried to alleviate these concerns in two ways: (1) by offering privacy policies that promise certain level of privacy protection; (2) by offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information processing theory of motivation. This paper follows Hann et al.(2007)'s methods to analyze Internet users privacy concerns in Korea and tries to compare the findings. Our research objectives are as follows: First, we analyze privacy concern mitigation strategies in the framework of the expectancy theory of motivation. Subsequently, we show how the expectancy theory based framework is linked o the conjoint analysis. We empirically validate the predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. In order to accommodate real-life contexts, we investigate these means in trade-off situation, where an organization may only be able to offer partially complete privacy protection and/or promotions and/or convenience, While privacy protection (secondary use, improper access) are associated with positive valences, we also find that financial gains can significantly increase the individuals' motivational score of a website in Korea. One important implication of this empirical analysis is that organizations may possess means to actively manage the privacy concerns of Internet users. Our findings show that privacy policies are valued by users in Korea just as in the US or Singapore. Hence, organizations can capitalize on this, by stating their privacy policy more prominently. Also organizations would better think of strategies or means that may increase online users' willingness to provide personal information. Since financial incentives also significantly increase the individuals' motivational score of website participation, we can quantify the value of website privacy protection in terms of monetary gains. We find that Korean Internet users value the total privacy protection (protection against errors, improper access, and secondary use of personal information) as worthy as KW 25,550, which is about US 28. Having done this conjoint analysis, we next adopt cluster analysis methodology. We identify two distinct segments of Korea's internet users-privacy guardians and information sellers, and convenience seekers. The immediate implication of our study is that firms with online presence must differentiate their services to serve these distinct segments to best meet the needs of segments with differing trade-offs between money and privacy concerns. Information sellers are distinguished from privacy guardians by prior experience of information provision, To the extent that businesses cannot observe an individual's prior experience, they must use indirect methods to induce segmentation by self-selection as suggested in classic economics literature of price discrimination, Businesses could use monetary rewards to attract information sellers to provide personal information. One step forward from the societal trends that emphasize the need of legal protection of information privacy, our study wants to encourage organizations and related authorities to have the viewpoints to consider both importance of privacy protection and the necessity of information trade for the growth of e-commerce.

Clinical Information Protection Behavior in a Medical Institution : Based on Health Psychology Theories (의료기관 종사자의 진료정보 보호행위분석: 건강심리이론관점을 중심으로)

  • Son, Mi-Jung;Yoon, Tai-Young;Lee, Sang-Chul
    • Journal of Korean Society for Quality Management
    • /
    • v.42 no.2
    • /
    • pp.153-163
    • /
    • 2014
  • Purpose: This research aims to find out clinical information protection behavior within a medical institution in mandatory circumstance based on health psychology theories Methods: This research has developed the survey based on the variables from ealth psychology theories; and conducted the survey during the whole month in April 2013. In the end, 256 samples have been used for this research's analysis. Results: First of all, Empirical results has proved that perceived benefits, self-efficacy, and cues to action have an positive influence on clinical information protection behavior. Perceived barriers has an negative influence. Finally, it has proven from the research that perceived severity and perceived susceptibility do not have an impact on clinical inf ormation protection behavior Conclusion: These findings provide an enriched understanding about medical institution workers information protection behavior on patient's clinical information.

The Effects of Middle School Students' Participation Motivation in Judo as a Recreational Sport Activity on Exercise Flow and Psychological Happiness

  • Cho, Cheol-Kyu;Shin, Min-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.203-209
    • /
    • 2020
  • The purpose of this study is to define how middle school students' motivation of participation in Judo as a recreational sport activity influences their exercise flow and psychological happiness. To achieve that, this researcher conducted a questionnaire survey with middle school students who participated in 2020 National Amateur Judo Event held in Donghae-si, Gangwon-do from Jan. 18 to 20, 2020, for three days. Of the collected questionnaire copies, the questionnaire copies with insincere or insufficient answers were excluded, and 253 copies were used for data analysis. The results of the study are presented as follows: Firstly, middle school students' participation motivation in Judo as a recreational sport activity positively influenced their exercise flow. Secondly, participation motivation in Judo as recreational sport activity positively affected psychological happiness. Thirdly, middle school students' exercise flow to Judo as a recreational sport activity positively influenced their psychological happiness. Therefore, instructors for the recreational sport activity need to develop detailed methods or programs to improve students' personality and leadership beyond Judo skills in order to achieve positive and smooth communication with participants.

Wavelet based Watermarking Technique for the Digital Contents Protection (지적재산권 보호를 위한 웨이블릿 기반 워터마킹 기술)

  • 송학현;김윤호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.912-917
    • /
    • 2004
  • The increase of illegal usage and conflict in digital content market would diminish motivation of creators for their work, furthermore break down digital content market on cyber-space. Watermarking technology support to the legal users by the protection technique based on the digital content copyright protection method(DRM). Most of previous digital watermarking have embeded to the content. In this paper, we propose a wavelet based watermarking method which is used for implementing in the frequency domain.

Development and Evaluation of a Joint Health Self-management Program for the Elderly with Knee Osteoarthritis in Communities: Applying the IMB Model (재가 무릎 골관절염 환자의 관절건강 자가관리 프로그램 개발 및 효과: IMB 모델 적용)

  • Kim, Young-il;Park, Jeong Sook
    • Research in Community and Public Health Nursing
    • /
    • v.28 no.1
    • /
    • pp.55-68
    • /
    • 2017
  • Purpose: The purpose of this study is to develop and evaluate a joint health self-management program for knee osteoarthritis elders in communities. Methods: This program was developed based on the IMB (information-motivationbehavioral skills) model. The program methods include education, setting and achieving goals, sharing experiences, telephone counseling, and self-monitoring. The topics of the program include joint assessment, exercise, massage, joint protection, medication, depression management, diet, and healthcare approach. The research was conducted following the principles of the nonequivalent control group pretest-posttest design. Participants were 26 subjects in the experimental group, and 27 subjects in the control group. The experimental group participated in the self-management program, and the control group received general education. Results: Both post-test scores of personal motivation, social motivation, behavior skill, self-management behavior, joint pain, joint stiffness, physical function disability, right knee extension, left knee extension, and depression were significantly different between the experimental group and the control group. Conclusion: The results of the study can be used to develop and standardize a systematic joint health self-management program. Further research is highly recommended to develop a strategy to continuously facilitate self-management of osteoarthritis patients' procedures.