• Title/Summary/Keyword: Person-Technology Fit Model

Search Result 8, Processing Time 0.02 seconds

A Study on Influence Factors of the Task Performance with Utilizing SNS by School Librarians (학교도서관 사서의 SNS활용과 업무성과의 영향요인 연구)

  • Byeon, Hoi-Kyun;Cho, Hyun-Yang
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.4
    • /
    • pp.71-90
    • /
    • 2014
  • This study aims at examining the ways which a school librarian uses SNS when performing tasks and the use of SNS with the features of the task and the organizational system run by one person affect task performance. In this study, for objective explanation of the interrelation among a librarian's tasks and the use of SNS and performance, the model of a Librarian's Task-SNS Technology Fit was suggested through the combination of the Technology Acceptance Model and the Task-Technology Fit. Based on the result of the survey analysis, their utilization of SNS is not just limited to personal taste nor interferes with their work. Rather, it enhances task performance owing to the characteristics of the tasks or the organization such as the organizational system run by one person.

A Study on Influencing Factors on User's Adoption Resistance to Personal Cloud Computing Service (개인용 클라우드 컴퓨팅 서비스 수용저항에 영향을 미치는 요인에 관한 연구)

  • Jo, In-Jea;Kim, Sun-Kyu;Yang, Sung-Byung
    • Knowledge Management Research
    • /
    • v.16 no.1
    • /
    • pp.117-142
    • /
    • 2015
  • Recently, the personal cloud computing service has been being spotlighted as an individual tool of productivity enhancement. However, compared to the rosy forecast, its diffusion rate in the domestic (Korean) market is much slower than expected. In order to find the reason for the slow growth of personal cloud computing service, we attempt to identify influencing factors on user's adoption resistance, while most prior research has focused on the factors affecting its adoption. Based on both the person-technology fit model and the privacy calculus model, we propose technostress and perceived value as key antecedents of adoption resistance. In addition, we identify (1) technical (pace of change and complexity) and personal (self-efficacy) influencing factors on technostress, and (2) beneficial (perceived mobility and perceived availability) and harmful (perceived vulnerability) influencing factors on perceived value. To validate our research model, 133 individual samples were gathered from undergraduate and graduate students who had actual experience of using at least one of personal cloud computing services. The results of the structural equation modeling confirm that both technostress and perceived value have significant effects on adoption resistance, but they have different influencing mechanisms to different types of adoption resistance (indifference, postponement, and rejection). Theoretical and practical contributions are discussed in the conclusion.

The Mitigation of Information Security Related Technostress and Compliance Intention (조직 내 정보보안 기술스트레스 완화와 준수의도)

  • Hwang, Inho;Hu, Sungho
    • The Journal of Information Systems
    • /
    • v.29 no.1
    • /
    • pp.23-50
    • /
    • 2020
  • Purpose As information management grows in importance around the world, organizations are investing in information security technology. However, the higher the level of information security technology in an organization, the higher the techno-stress of employees. The purpose of this study is to suggest stress factors related to information security technology that affect the reduction of employees' intention to comply with information security and to suggest ways to alleviate stress. Design/methodology/approach The research presented a model for mitigating technical stress related to information security based on technical stress theory and person-organization fit theory. 346 questionnaire data were analyzed from the members of the organization who applied the information security technology, and the research hypothesis was verified through the structural equation modeling. Findings The hypothesis test confirms that security-related techno-stress reduces the information security compliance intention of employees, organizational technical support mitigates technical stress, and person-organization fitness mitigates the negative relationship between techno-stress and compliance intention. The results of the study contribute to the organization's strategy for minimizing the reduction of the information security compliance intention of employees, and are meaningful in that the theoretical basis for mitigating techno-stress is provided in the field of information security.

The Effect of Person-Job Fit on Job Satisfaction for the Employees of the Service Sector: Focused on the Mediating Effects of Perceived Organizational Support (서비스직 근로자의 개인-직무 적합성과 직무만족 관계에서 조직후원인식의 매개효과 분석)

  • Jang, Sunyun;Song, Ji Hoon;Kim, Soo Jung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.111-120
    • /
    • 2019
  • This study examined the mediating effects of perceived organizational support (POS) on the relationship between the person-job fit and job satisfaction of service workers. POS is divided into socioemotional POS and instrumental POS. To achieve the research purpose, a questionnaire survey was conducted on workers in charge of service jobs in domestic companies through an on-line survey system and finally, the results of 281 respondents were analyzed to verify the hypothesized research model with an 80.3% effective recovery rate. The findings are as follows. First, the person-job fit has positive effects on job satisfaction and POS. Second, among the sub-constructs of POS, socioemotional support has mediating effects, but instrumental support has no mediating effects on the relationship between person-job fit and job satisfaction. Based on the results of this study, this study suggests theoretical and practical implications for the human resource development and management of service workers. Overall, changes in the recruitment system, which can judge the person-job fit of employees who perform emotional labor facing customers, organizational culture and personnel system for establishing socioemotional support system, and compensation and workforce development system, are needed to enhance the job satisfaction of service workers.

A Predictive Model on Patient-Centered Care of Hospital Nurses in Korea (상급종합병원 간호사의 환자중심간호 예측모형)

  • Jeong, Hyun;Park, Myonghwa
    • Journal of Korean Academy of Nursing
    • /
    • v.49 no.2
    • /
    • pp.191-202
    • /
    • 2019
  • Purpose: Patient-centered care is a widely utilized concept in nursing and health care. However, the key components of patient-centered nursing have not yet been reported. Moreover, previous studies on patient-centered care have mostly focused on components of nursing rather than organizational factors. Therefore, a comprehensive understanding of influential factors of patient-centered care is required. Methods: The purpose of this study was to develop a theoretical model based on person-centered care theory, and the relevant literature and to test the developed model with covariance structure analysis in order to determine the causal paths among the variables. Results: The model fit indices for the hypothetical model were suitable for the recommended level (goodness of fit index=.87, standardized root mean residual=.01, root mean square error of approximation=.06, Tucker-Lewis index=.90, comparative fit index=.92, parsimonious normed fit index=.75). In this study, five of the six paths established in the initial hypothetical model were supported. The variables of teamwork, self-leadership, and empathy accounted for 56.4% of hospital nurses' patient-centered care. Among these, empathy was the strongest predictor of patient-centered care. Conclusion: These results suggest that it is necessary to use strategies to improve self-leadership and empathy. In addition to enhancing the personal factors of nurses, nursing organizations should strive for effective multidisciplinary cooperation with active support for patient-centered care and openness to change.

An Investigation of Causes and Effects of Technostress Creators (테크노스트레스 유발 요인의 원인과 영향에 대한 연구)

  • Yim, Myung-Seong;Han, Kun Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.31-45
    • /
    • 2013
  • The purpose of this study is to investigate the relationships among causes and effect of technostress creators and technostress creators. Rooted in the person-technology fit model, this research suggests cause of technostress creators such as system quality and system vulnerability. Furthermore, the research suggests outcome of technostress such as organizational commitment. The research found that system vulnerability has significant effects on the technostress creators. In addition, technostress creators influence significantly an organizational commitment. The conclusions and implications are discussed.

A Goodness of Fit and Validity Study of the Korean Radiological Technologists' Core Job Com petency Model (방사선사 핵심 직무역량 모델의 적합성 및 타당성 검증)

  • Lim, Chang-Seon;Cho, A Ra;Hur, Yera;Choi, Seong-Youl
    • Journal of radiological science and technology
    • /
    • v.40 no.3
    • /
    • pp.469-484
    • /
    • 2017
  • Radiological Technologists deals with the life of a person which means professional competency is essential for the job. Nevertheless, there have been no studies in Korea that identified the job competence of radiologists. In order to define the core job competencies of Korean radiologists and to present the factor models, 147 questionnaires on job competency of radiology were analyzed using 'PASW Statistics Version 18.0' and 'AMOS Version 18.0'. The valid model consisted of five core job competencies ('Patient management', 'Health and safety', 'Operation of equipment', 'Procedures and management') and 17 sub - competencies. As a result of the factor analysis, the RMSEA value was 0.1 and the CFI, and TLI values were close to 0.9 in the measurement model of the five core job competencies. The validity analysis showed that the mean variance extraction was 0.5 or more and the conceptual reliability value was 0.7 or more, And there was a high correlation between subordinate competencies included in each subordinate competencies. The results of this study are expected to provide specific information necessary for the training and management of human resources centered on competence by clearly showing the job competence required for radiologists in Korea's health environment.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.