• Title/Summary/Keyword: user context factors

Search Result 153, Processing Time 0.026 seconds

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

The Effect of Cognitive Absorption on the Individual Intention of Technology Acceptance: An Empirical Study on the MP3 Player (인지적 몰입이 개인의 기술 수용에 미치는 영향: MP3 플레이어에 대한 실증 연구)

  • Kim, Bo-Youn;Lee, Sang-Gun;Kang, Min-Cheol
    • Asia pacific journal of information systems
    • /
    • v.16 no.1
    • /
    • pp.45-69
    • /
    • 2006
  • Technology Acceptance Model (TAM) has been widely used to predict user's behavior to accept the technology. Prior researches have been mainly focused on innovation constructs such as perceived usefulness and perceived ease of use. However, very little research has been conducted to understand individual mental beliefs in technology acceptance and imitation influence. This study integrates Technology Acceptance Model (TAM), Flow Theory (FT) and Diffusion of Innovation Theory (DIT). This paper indicates that imitation context, cognitive absorption (CA) based Flow theory and innovation context are the three important factors influencing user acceptance of information technologies. The proposed model has been tested among 232 users of MP3 players. Results showed that innovation context and cognitive absorption have positive influences on intention to use technology. Not all factors of the imitation context have direct effect on intention to use. However, we found that imitation context has positive influence on intention to use technology through cognitive absorption.

Mapping Experiential Context factors on the Website Use Experience : through analysis of practical use cases (웹 사용 경험의 정황 요소 매핑에 관한 연구 : 실증적 사례 분석을 중심으로)

  • 김현정
    • Archives of design research
    • /
    • v.17 no.1
    • /
    • pp.265-276
    • /
    • 2004
  • User experience in web site is beyond Usability, and should be understood in a context. However, the concrete contextual factors of web site experience is not systematically established enough. Therefore, the objective of this research is to establish a framework of mapping experiential context factors with analyzing real web site use cases, and to propose how it is can be applied in the process of web site contents planning. First of all, theoretical framework for the web experience and contextual factors was prepared by secondary research. Second, user experience on music casting sites was collected through web diary method, self-video recording method, and group interview. Then, collected experience was re-constructed with scenarios. Scenarios are analyzed into contextual factors and these factors are categorized, given hierarchies and located into context map. Third, the possibility of applying the context map of web site experience was discussed. The systematical and concrete sample of context map based on practical use cases can be applied in the innovative and cross-genre web contents planning process.

  • PDF

Factors Affecting User Acceptance of Ubiquitous Computing based on Mobile Services (모바일 서비스에 기반한 유비쿼터스 컴퓨팅의 사용자 수용에 영향을 미치는 요인)

  • No, Mi-Jin;Kim, Byung-Gon;Park, Soon-Chang
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.1
    • /
    • pp.55-74
    • /
    • 2011
  • The growth in the use of ubiquitous computing based on mobile services as an enabler to conduct business more effectively has been phenomenal. Technology acceptance model (TAM) has been applied in different contexts to examine a wide range of information technologies (IT). As more and more companies are finding ways to utilize ubiquitous computing based on mobile services, an important issue is to understand what factors will impact the decisions of consumers in adopting the services. Based on TAM with three additional groups of external factors, i.e., service-related factors (ubiquitous access, context awareness) and technology-related factors (perceived security risk, network connectivity) that are theoretically justified as having influence on both perceived usefulness and perceived ease of use which are additionally considered, a research model for the investigated technology acceptance was developed and empirically examined, using responses from more than intended users of ubiquitous computing based on mobile services. The specific purposes of this study are as follows. Firstly, this study is to identify service beliefs considering unique characteristics for ubiquitous services such as perceived ubiquitous access and perceived context awareness. Secondly, this study is to investigate network characteristics beliefs such as perceived security and perceived connectivity. Thirdly, this paper investigates the relationship among variables such as ubiquitous characteristics, network characteristics, behavioral beliefs, and intention to use ubiquitous web services. This study uses a structural equation model to test the research model. The major results of this study are as follows. Firstly, ubiquitous access has a influence on perceived usefulness and perceived ease of use. Context awareness has an influence on perceived usefulness. Secondly, User familiarity has an influence on perceived usefulness and perceived ease of use, and intention to use. User innovativeness has an influence on perceived ease of use. Thirdly, perceived security risk has an influence on perceived usefulness and perceived ease of use. Network connectivity has an influence on perceived usefulness and perceived ease of use. Fourth, there exist differential effects among factors in structural model among information, transaction, and entertainment services.

A Study on the Factors Affecting the Success of End-User Computing (최종사용자 컴퓨팅의 성패 영향요인 연구)

  • Seo, Geon-Su
    • Asia pacific journal of information systems
    • /
    • v.5 no.2
    • /
    • pp.259-288
    • /
    • 1995
  • Using end-user attitude as intervening variable, this paper proposes a causal model of how environmental factors of EUC influence end-user computing (EUC) success, measured by the degree of IS use. This study identifies unique aspects of the EUC environment and generates key dimensions of end-user attitude appropriate for this context : perceived information quality, perceived design quality, and perceived usefulness. The research model includes six environmental factors - top management support, end-user education, task variability, task analyzability, end-user's computing ability, and end-user involvement. A field study was undertaken to test the hypothesized relationships among the research variables. The results generally support the assumption that end-user attitude intervene the impact of environmental factors on IS use. The implications of the findings are discussed.

  • PDF

The User Fee Introduction and Its Effect in the Health System of Low and Middle Income Countries: An Exploratory Study Using Realist Review Method (중·저소득 국가의 건강보장제도에서 이용자 부담 도입과 효과: Realist Review 방법을 활용한 탐색적 연구)

  • Son, Kyung Bok;Kim, Chang-Yup
    • Health Policy and Management
    • /
    • v.25 no.3
    • /
    • pp.207-220
    • /
    • 2015
  • Background: The purpose of this exploratory study is to explain where, when and how the introduction of user fee system works in low and middle income countries using context, mechanism, and outcome configuration. Methods: Considering advanced research in realist review approach, we made a review process including those following 4 steps. They are identifying the review question, initial theory and mechanism, searching and selecting primary studies, and extracting, analyzing, and synthesizing relevant data. Results: User fee had a detrimental effect on medical utilization in low and middle income countries. Also previous and current interventions and community participation were critical context in user fee system. Those contexts were associated with intervention initiation and recognition and coping strategies. Such contexts and mechanisms were critical explanatory factors in medical utilization. Conclusion: User fee is a series of interventions that are fragile and dynamic. So the introduction of user fee system needs a comprehensive understanding of previous and new intervention, policy infrastructure, and other factors that can influence on medical utilization.

User Experience Design for future workplace based on IoT (IoT기반의 미래 Workplace를 위한 사용자 경험 디자인 연구)

  • Park, Namchoon
    • Journal of the HCI Society of Korea
    • /
    • v.12 no.4
    • /
    • pp.57-64
    • /
    • 2017
  • The user-centered design paradigm shift and the emergence of user-experience design have also increased the importance of user experience with products and services in specific spaces. In addition, with the advent of IoT services, new changes in the future work environment are expected. This study aims to propose a new user experience design considering the context of future work space. First of all, we examined the concept and nature of IoT, and defined various factors that affect the future work environment and grasped the relation of each element. Next, user research in the current work environment was conducted to identify the context that affects the behavior of users in various types of work environments, and to insight the possibility of a new user experience in the future work environment. Based on the above analysis and insights, various context models for a new future work environment were constructed, and UX models and UX scenarios and alternatives were presented. This study will contribute to the diversity of UX design research by expanding the viewpoint of UX design from device to space and context, and it will contribute to the collaborative research with space design and service design, also interdisciplinary research with IoT service related field.

A Study on Users' Resistance toward ERP in the Pre-adoption Context (ERP 도입 전 구성원의 저항)

  • Park, Jae-Sung;Cho, Yong-Soo;Koh, Joon
    • Asia pacific journal of information systems
    • /
    • v.19 no.4
    • /
    • pp.77-100
    • /
    • 2009
  • Information Systems (IS) is an essential tool for any organizations. The last decade has seen an increasing body of knowledge on IS usage. Yet, IS often fails because of its misuse or non-use. In general, decisions regarding the selection of a system, which involve the evaluation of many IS vendors and an enormous initial investment, are made not through the consensus of employees but through the top-down decision making by top managers. In situations where the selected system does not satisfy the needs of the employees, the forced use of the selected IS will only result in their resistance to it. Many organizations have been either integrating dispersed legacy systems such as archipelago or adopting a new ERP (Enterprise Resource Planning) system to enhance employee efficiency. This study examines user resistance prior to the adoption of the selected IS or ERP system. As such, this study identifies the importance of managing organizational resistance that may appear in the pre-adoption context of an integrated IS or ERP system, explores key factors influencing user resistance, and investigates how prior experience with other integrated IS or ERP systems may change the relationship between the affecting factors and user resistance. This study focuses on organizational members' resistance and the affecting factors in the pre-adoption context of an integrated IS or ERP system rather than in the context of an ERP adoption itself or ERP post-adoption. Based on prior literature, this study proposes a research model that considers six key variables, including perceived benefit, system complexity, fitness with existing tasks, attitude toward change, the psychological reactance trait, and perceived IT competence. They are considered as independent variables affecting user resistance toward an integrated IS or ERP system. This study also introduces the concept of prior experience (i.e., whether a user has prior experience with an integrated IS or ERP system) as a moderating variable to examine the impact of perceived benefit and attitude toward change in user resistance. As such, we propose eight hypotheses with respect to the model. For the empirical validation of the hypotheses, we developed relevant instruments for each research variable based on prior literature and surveyed 95 professional researchers and the administrative staff of the Korea Photonics Technology Institute (KOPTI). We examined the organizational characteristics of KOPTI, the reasons behind their adoption of an ERP system, process changes caused by the introduction of the system, and employees' resistance/attitude toward the system at the time of the introduction. The results of the multiple regression analysis suggest that, among the six variables, perceived benefit, complexity, attitude toward change, and the psychological reactance trait significantly influence user resistance. These results further suggest that top management should manage the psychological states of their employees in order to minimize their resistance to the forced IS, even in the new system pre-adoption context. In addition, the moderating variable-prior experience was found to change the strength of the relationship between attitude toward change and system resistance. That is, the effect of attitude toward change in user resistance was significantly stronger in those with prior experience than those with no prior experience. This result implies that those with prior experience should be identified and provided with some type of attitude training or change management programs to minimize their resistance to the adoption of a system. This study contributes to the IS field by providing practical implications for IS practitioners. This study identifies system resistance stimuli of users, focusing on the pre-adoption context in a forced ERP system environment. We have empirically validated the proposed research model by examining several significant factors affecting user resistance against the adoption of an ERP system. In particular, we find a clear and significant role of the moderating variable, prior ERP usage experience, in the relationship between the affecting factors and user resistance. The results of the study suggest the importance of appropriately managing the factors that affect user resistance in organizations that plan to introduce a new ERP system or integrate legacy systems. Moreover, this study offers to practitioners several specific strategies (in particular, the categorization of users by their prior usage experience) for alleviating the resistant behaviors of users in the process of the ERP adoption before a system becomes available to them. Despite the valuable contributions of this study, there are also some limitations which will be discussed in this paper to make the study more complete and consistent.

Extended Role-Based Access Control with Context-Based Role Filtering

  • Liu, Gang;Zhang, Runnan;Wan, Bo;Ji, Shaomin;Tian, Yumin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1263-1279
    • /
    • 2020
  • Activating appropriate roles for a session in the role-based access control (RBAC) model has become challenging because of the so-called role explosion. In this paper, factors and issues related to user-driven role management are analysed, and a session role activation (SRA) problem based on reasonable assumptions is proposed to describe the problem of such role management. To solve the SRA problem, we propose an extended RBAC model with context-based role filtering. When a session is created, context conditions are used to filter roles that do not need to be activated for the session. This significantly reduces the candidate roles that need to be reviewed by the user, and aids the user in rapidly activating the appropriate roles. Simulations are carried out, and the results show that the extended RBAC model is effective in filtering the roles that are unnecessary for a session by using predefined context conditions. The extended RBAC model is also implemented in the Apache Shiro framework, and the modifications to Shiro are described in detail.