• Title/Summary/Keyword: self-networking

Search Result 150, Processing Time 0.025 seconds

Difference of Factors Affecting Continuance Use and Self-Disclosure of SNS Users: Focused on a Dual-Factor Model (SNS 사용자들의 지속 사용과 정보 공유에 영향을 미치는 선행 요인의 차이: 듀얼 팩터 모형을 중심으로)

  • Kim, Byoungsoo;Kim, Hyoeun;Kim, Dae-Kil
    • The Journal of Information Systems
    • /
    • v.25 no.4
    • /
    • pp.1-21
    • /
    • 2016
  • Purpose The study analyzed the factors affecting continuance use and self-disclosure in the SNS(social networking service) context based on a dual-factor model. As SNS users have concerned privacy for a long time, privacy concern affects continuous use and self-disclosure. In details, concern over privacy may have a stronger effect on self-disclosure than on continuance use as users' personal information can be more exposed during posting their dailies and photos. Design/Methodology/Approach SNS benefits, trust in SNS providers, and social influence are served as the key enablers and privacy concern as the inhibitor. Moreover, the relative impacts of SNS benefits and privacy concern on continuance use and self-disclosure were analysed in this study. From the data of 327 Facebook users, the researchers tested proposed theoretical model by using PLS. Findings Users' continuance intention and self-disclosure behavior are differently affected by different antecedents. Trust in SNS provider had a significant effect on self-disclosure intention, while it has no significant effect on continuance intention. Concern over privacy was negatively related to self-disclosure intention, while it was positively associated with continuance intention.

Self-Disclosure and Cyberbullying on SNS (SNS상에서 자기노출과 사이버불링)

  • Jooyeon Won;DongBack Seo
    • Information Systems Review
    • /
    • v.19 no.1
    • /
    • pp.1-23
    • /
    • 2017
  • Since the development of information communication technologies, social networking sites (SNSs) have been diffused to the world with benefits such as building and maintaining relationships among people. SNSs have become more popular with the development of mobile devices. Despite this advantage, SNSs also present unexpected effects on people, such as cyberbullying and identity theft. Cyberbullying has emerged as one of the most serious issues among people who use SNSs. In fact, almost 20% of teenagers confessed that they have been cyberbullied on SNSs. In consideration of this serious social issue, this study investigates the influences of self-disclosure and self-control on the cyberbullying victimization experience from the perspective of Social Exchange Theory. Self-disclosure is a basic characteristic of SNSs. It is classified into self-disclosure for access to SNS and self-disclosure for relationship building and maintaining on SNSs. The cyberbullying victimization experience is classified into being cyber-excluded and being cyber-attacked. We examine how two types of self-disclosure and self-control affect two types of cyberbullying victimization experience based on the survey data of people who are in their 20s and are greatly familiar with SNSs.

Self-adaptation Service with Context-awareness on Active Network for Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 위한 액티브네트워크상의 문맥인식성을 고려한 자치 적응성 서비스)

  • Hong Sungjune;Han Sunyoung
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.633-642
    • /
    • 2004
  • A self-adaptation with context-awareness is needed within network to meet costumed services according a user's changing constraints. But the existing network has many difficulty in adding new functions because of slow standardization of network and slow deployment of new services. To solve this problem, an active network can support the suitable environment to add new function such as self- adaptation. Therefore, this Paper suggests Self Adaptation Service(SAS) using agent-based active network and the constraint-based Service Creation Environment(SCE) to support self-adaptation with context-awareness. SAS provides benefits to support the context-aware service and the fast deployment of new services.

A Lifestyle-Routine Activity Theory (LRAT) Approach to Cybercrime Victimization: An Empirical Assessment of SNS Lifestyle Exposure Activities

  • Jihae Suh;Jiseon Choe;Jinsoo Park
    • Asia pacific journal of information systems
    • /
    • v.30 no.1
    • /
    • pp.53-71
    • /
    • 2020
  • The Internet and all of its possibilities and applications have changed individuals' lifestyles in relation to socializing, working, and how they spend their leisure time. Social networking sites (SNSs), such as Facebook or Instagram, are ideal settings for interacting with others but, unfortunately, they are also ideal settings for motivated offenders to commit cybercrimes. Thus SNS users may be more vulnerable to cybercrime. The purpose of this study is to investigate the occurrence of cybercrime victimization, specifically cyber-harassment, cyber-impersonation, and hacking. Self-report surveys collected from a sample of 147 respondents were examined using the moderated multiple regression analysis and a logistic regression analysis to determine possible relationships between SNS lifestyle exposure activities and cybercrime victimization. The results indicate moderate support for the application of lifestyle-routine activity theory (LRAT) to cybercrime victimization. Possible educational and managerial implications, as well as suggestions for future research, are discussed.

Self-Directed Learning Strategies of High Academic Achievers Majoring in Engineering (공학전공 우수학습자의 자기주도학습전략 탐색)

  • Jin, Sung-Hee
    • Journal of Engineering Education Research
    • /
    • v.16 no.5
    • /
    • pp.24-35
    • /
    • 2013
  • This study aims to explore self-directed learning strategies of high academic achievers majoring in engineering. The research participants were 21 fourth-year students who had attained the first or second highest cumulative grade point average in each department during the past three-year and were asked to write an essay on "my successful learning methods or techniques." The essays were analyzed by theme analysis method which is one of the qualitative methods to extract the self-directed learning strategies used by high performing students. According to the results of this study, the self-directed learning strategies of excellent students could be categorized into fundamental strategies to induce self-directed learning, preparatory strategies, implementation strategies and management strategies for marinating self-directed learning. Detail information on each category is as follow: 1) fundamental strategies refer to positive and pleasant mind, academic confidence and effort attribution, 2) preparatory strategies refer to concrete and challenging goal setting, establishment of learning strategies adjusted courses characteristics and practical learning planning, 3) implementation strategies refer to intensive learning in class, knowledge exploration, knowledge acquisition, social networking and exhaustive preparation for exams and 4) management strategies refer to time management and learning environment management.

Predicting Information Self-Disclosure on Facebook: The Interplay Between Concern for Privacy and Need for Uniqueness

  • Kim, Yeuseung
    • International Journal of Contents
    • /
    • v.15 no.4
    • /
    • pp.74-81
    • /
    • 2019
  • This study examined the overall relationship between information privacy concern, need for uniqueness (NFU), and disclosure behavior to explain the personal factors that drive data-sharing on Facebook. The results of an online survey conducted with 222 Facebook users show that among diverse data that social media users disclose online, four distinct factors are identified: basic personal data, private data, personal opinions, and personal photos. In general, there is a negative relationship between privacy concern and a positive relationship between the NFU and the willingness to self-disclose information. Overall, the NFU was a better predictor of willingness to disclose information than privacy concern, gender, or age. While privacy concern has been identified as an influential factor when users evaluate social networking sites, the findings of this study contribute to the literature by demonstrating that an individual's need to manifest individualization on social media overrides privacy concerns.

#Looksperfectgram: The Relationship between Perfectionistic Self-Presentation, Self-Construal, Self-Efficacy and Intention to Use Instagram (개인특성에 따른 인스타그램 사용의도: 완벽주의적 자기제시, 자기효능감, 자아해석을 중심으로)

  • Ahn, Gayoung;Han, Eun-Kyoung
    • Journal of Digital Convergence
    • /
    • v.17 no.7
    • /
    • pp.317-329
    • /
    • 2019
  • Instagram, a photo and image centered social networking service, has received increasing attention these days, from scholars and practitioners. However, little is known about the social and psychological factors that lead consumers to use this service. To provide a baseline understanding on Instagram users, the current study was conducted to discover perfectionistic self-presentation tendency expressed by the Instagram users and explore the relationships between identified perfectionistic self-presentation and intention to use Instagram variables with 250 participants. In addition, this study tried to determine the moderator effect of self-efficacy and self-construal. A comprehensive survey was directed and a total of 380 participants were recruited to verify anticipated hypotheses and research questions. The research results suggest that perfectionistic self-presentation has five sub factors: others conscious self-presentation, subjective self-presentation, environmental adaptation self-presentation, self-expansion self-presentation, and social self-presentation. The implications of this research findings are discussed.

Research Output of the Pakistani Library and Information Science Authors: A Bibliometric Evaluation of Their Impact

  • Anwar, Mumtaz Ali;Jan, Sajjad Ullah
    • Journal of Information Science Theory and Practice
    • /
    • v.5 no.2
    • /
    • pp.48-61
    • /
    • 2017
  • This paper uses 601 cited papers of Pakistani LIS researchers with the purpose to examine the individual performance of these Library and Information Science (LIS) researchers in terms of their research output and its impact on the LIS (national/international) literature by using various bibliometric indicators. A list of 139 authors was compiled with the help of the Library, Information Science, and Technology Abstracts (LISTA) and some other sources. Data were collected from Google Scholar and SPSS version 20 was utilized in order to identify the relationship between self-citations and various performance indices of the authors. The average citations received per paper vary from 1.80 to 10.08. About half of the papers were single-authored whereas less than one-fifth were by three or more authors. The authors who worked in collaboration produced more papers and received more citations. The h-index, g-index, hI-index, hI-norm, and e-index were used to determine the rank for each author. The intra-group citations grid revealed the volume of self-citations and a small group who cite each other more due to close academic and social relationships. The correlations between self-citations and the impact indices used revealed significant differences. Findings are useful for concerned institutions regarding award, promotions, etc. Further, future research should seriously consider the self-citations and social networking of authors while examining their citations-based research performance.

The Effect of Self-Presentation and Self-Expression attitude on Selfie Behavior in SNS (자기제시와 자기표현 태도가 SNS 셀피 행동에 미치는 영향)

  • Kim, Dong Seob;Baek, Eunsoo;Choo, Ho Jung
    • Fashion & Textile Research Journal
    • /
    • v.19 no.6
    • /
    • pp.701-711
    • /
    • 2017
  • This research aimed to understand selfie behavior in social networking sites (SNSs). The research was conducted on the basis of the functional theories of attitude, verified self-presentation attitude, and self-expression attitude that affect selfie behaviors (i.e., taking selfies, posting selfies, and taking selfies for fashion product exposure). The moderating effect of satisfaction toward one's appearance was identified. The participants of the study were SNS users aged 20-30 years who had posted selfies in the past month. A survey was performed using an online panel of an international survey firm. The data were analyzed using hierarchical regression analysis on SPSS 22.0. Results corroborated that self-expression attitude affected the number of selfies taken but not the number of selfies posted and those uploaded for fashion product exposure. Self-presentation attitude exerted a significant effect on the number of selfies posted and those uploaded for fashion product exposure. When satisfaction toward one's appearance was high, self-presentation attitude increased the influence of the behaviors of posting selfies and uploading selfies for fashion product exposure. Self-expression attitude also significantly influenced the number of selfies taken due to the moderating effect of satisfaction toward one's appearance. This research was made meaningful by its quantitative analysis of selfie behavior in SNSs. The results confirmed the different functions of attitudes affecting selfie behavior. With the improved understanding of selfie behavior obtained from this research, Social Media marketing may be carried out in various industrial fields in the future.

Automatic Intrusion Response System based on a Self-Extension Monitoring (자기확장 모니터링 기반의 침입자동대응 시스템)

  • Jang, Hee-Jin;Kim, Sang-Wook
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.489-497
    • /
    • 2001
  • In the coming age of information warfare, information security patterns take on a more offensive than defensive stance. It is necessary to develop an active form of offensive approach to security protection in order to guard vital information infrastructures and thwart hackers. Information security products need to support an automatic response facility without human intervention in order to minimize damage to the attacked system and cope with the intrusion immediately. This paper presents an automatic intrusion response model which is developed on a Self-Extension Monitoring. It also proposes an ARTEMIS(Advanced Realtime Emergency Management and Intruder Identification System), which is designed and implemented based on the suggested model. The Self-Extension Monitoring using self-protection and replication minimizes spatial limitations on collection of monitoring information and intruder tracing. It enhances the accuracy of intrusion detection and tracing.

  • PDF