• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 3
  • 3
  • 3
  • 3
  • Tagged with
  • 15
  • 15
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A dynamic model of usage behavior and network effects in social network sites

Ahn, Dae-Yong 03 June 2010 (has links)
This paper structurally estimates a dynamic model of usage behavior and network effects in a social network site using data from MySpace.com. We view a social network as a stock of capital that yields a flow of utilities over time by creating social interactions between the owner and her friends. When one decides to use a social network site, it may have two distinct network effects: (1) one can manage an existing base of friends through social networking and thus prevent depreciation of capital stock (maintenance effect), and (2) one may acquire new friends through social networking, which results in creation of new capital stock (investment effect). Thus, we model social networking as a dynamic process, in which one's current action to use a social network site can influence the evolution of her social network. We found that realtime chat and messaging, features of MySpace.com, positively affect one's usage decision and hence achieve the intended goal of generating site traffic. However, different demographic groups may have idiosyncratic preferences for these features. Based on parameter estimates, we performed counterfactual simulations with the goal of providing managers with ways to enhance firm performance. / text
2

Internet Addiction Disorder of Adolescents¡GA System Dynamics Approach

Tu, Jui-lin 29 July 2008 (has links)
The fast rise of Internet broadens students¡¦ ways of learning and their views; however, there is possibility that improper Internet use will result in problems of Internet addiction. Reviewing the literature about Internet addiction, we can find that many studies were carried quantitatively by using a questionnaire survey to examine and explain the relationships among related variables and their intensity and then apply regression analysis and characteristic equation to find out the forecast of Internet addiction. These studies truly not only helped the academia understand the factors involved in Internet addiction but also offered reference materials for preventing and improving the problems. Nevertheless, there were some limits in these quantitative studies. For example, it is hard to understand the causal relationship among the factors. Also, one-way linear inference ignored the feedback behaviors from Internet addiction toward related factors and fell into one-way think mode. Internet addiction is indeed a mental problem and involves complicated and obscure factors, which usually could be cause and effect of each other. This study aimed to compensate for the loss of dynamic complexity in all kinds of Internet addiction modes in the literature by reviewing important literature, inducing and generalizing dangerous factors and effects, employing system dynamics to construct the dynamic mode of Internet addiction, and applying the picture of causal feedback and the mode of math to see through the structure of movement behind and the interaction among the factors. This study showed five main findings. First, hiding oneself in the Internet world, which could not reduce pressure, only helped obtain a temporary sense of achievement but resulted in severe outcomes, such as the problem of time management and a vicious circle of interpersonal relationship and schoolwork pressure produced by Internet addiction. Second, ¡§withdrawal symptoms¡¨ and ¡§a sense of achievement obtained on the Internet¡¨ were leading indicators for Internet addiction. Third, limiting the amount of time of surfing on the Internet and slackening withdrawal symptoms were temporary solutions to the problem at a later period. Moreover, there was a certain correlation among the critical points of value of withdrawal symptoms, limiting the amount of time of surfing on the Internet, and improving the timing. Fourth, only facing the problem was the ultimate solution to Internet addiction. Finally, the problem of Internet addiction was actually a transformed version of archetype brought up in the book ¡§The Fifth Discipline.¡¨
3

The Narrative Analysis of User Behavior on CRM System¡XA Case Study of an International Company

Lai, Hua-lin 04 August 2009 (has links)
Customers are very important to all companies. The study shows that organizations spent 6 to 9 times more obtaining new customers than keeping old customers. All companies try to figure out the customers who can bring them high profit and improve customer satisfaction through good customer management. Therefore many companies implement Customer Relationship Management (CRM) system to reach the goals. However, Gartner Group presents that 32% companies abandon CRM system after completing implementation. It does not mean finish when CRM system rolls out. The company has to know it is a long journey when it decides to implement CRM system. The company A in this study implemented CRM system, Siebel, in 2003. The first phase focused on Sales Force Automation module. CRM team is responsible for adoption mission. In the beginning, the usage rate was very low and it took long time to get users adopt the system. A company did not give up. It tamed the users through many ways. This study displays the war between CRM team, IT people, and sales representatives who are the most important users to this system. CRM team and IT people play important roles during the process of CRM implementation. For that reason, their feelings and thoughts cannot be ignored. To explain the user behavior, the study introduces Unified theory of Acceptance and Use of Technology (UTAUT), which was formulated with four core determinants of intention and usage. Although some phenomenon can be elaborated by this theory, the study discovers some points beyond it: the meaning of system to the users is more important than performance expectation and effort expectation in the theory, and adjusting the cooperation of all departments related to system is more effective than improving the system only .
4

Social Networking Sites Usage Behavior: Trust and Risk Perceptions

Mekala, Nithin Kumar Reddy 05 1900 (has links)
This dissertation addresses research questions related to defining user's trust and risk perceptions associated with social networking usage behavior in relation to the repeated privacy and security breaches. The general research question is explored in the dissertation via the conduct of three related studies. The finding from these three investigations are presented in the results section as 3 essays that collectively examine the social networking sites usage behavior. Essay 1 proposes a conceptual model based on the review of multiple breaches. The review provides a conceptual model which is further analyzed using a quantitative survey in the second essay. Essay 2 measures the trust and risk perceptions associated with different sources of information when presented with multiple breaches. This portion of the research used a quantitative method that included surveying of college students from University of North Texas (UNT) to understand the relation between user's trust and risk perceptions. Essay 3 examines the social networking usage behavior on account of repeated privacy and security breaches. This essay uses the insights from the other two essays to identify the usage behavior and how it is affected. The proposed model was tested using a survey questionnaire method. Results show a significant relationship between the positives, negatives, technology usage, repeated breaches that impacts usage behavior. The dissertation concludes with a summary of how the three essays make a cumulative contribution to the literature as well as providing practical guidance that identifies social networking usage behavior.
5

Smokeless tobacco – snus : critique of usage pattern & influencing factors

Dinh, Van H. January 2012 (has links)
As the global market place becomes more integrated and tensed, there is a shift from thetraditional marketing whereby attention is given solely to the sale of a product to a morecustomer-based marketing. Customer involvement in the processing of a product is thehighlight of this phenomenon. By this their needs and preferences for a product are welladdressed and base on this management can make effective decisions. Customer usagepattern and its influencing factors have become a key for business decision-making.Customer based notion is well known by its effective result in any kind of product. Theycould help businesses to manage, to adjust strategies to better match with the customersexpectations in existing markets. And to enter new markets, where the companies haveno historical databases of the local customers, the Snus usage pattern and its influencingfactors in previous growth markets are helpful to make use of.The motivation of this thesis therefore, is to find out the usage pattern and the influencingfactors of snus (smokeless tobacco) in its growth market such as Sweden and the UnitedStates where until recently gaining popularity. This thesis will make use of relatedtheories, previous studies on snus and behavioral pattern, influencing factors andobservation in Sweden and in the United States. The findings of this thesis and theinfluencing factors on snus usage behavior could be reference guidelines for decisionmakers in the tobacco industry in already existing snus markets and potential markets forthe product in places such as Vietnam and other parts of world. Aside these, the findingswill be helpful in managing tobacco companies in general and snus in particular inexisting markets.
6

Antecedentes do comportamento de uso da Shadow It e sua relação com o desempenho individual

Mallmann, Gabriela Labres January 2016 (has links)
Dado o uso crescente de tecnologias não autorizadas e não suportadas pelo departamento de TI nas organizações, chamadas de Shadow IT, o papel da TI e a forma tradicional de gerenciar tecnologia estão mudando dentro das organizações. Shadow IT refere-se ao uso de tecnologias utilizadas pelos funcionários sem a autorização ou o suporte formal da TI para realizar as tarefas de trabalho. Motivada por este contexto, esta pesquisa tem como objetivo verificar os fatores antecedentes ao comportamento de uso da Shadow IT e a relação deste comportamento com o desempenho individual dos usuários de TI. Para alcançar tal objetivo, foi realizada uma pesquisa survey com 286 usuários de TI da área administrativa. Estes usuários são funcionários de três diferentes empresas: um órgão público, uma empresa de educação profissional e uma cooperativa de crédito, as quais compõe a amostra. Esta pesquisa obteve como resultados que os fatores Experiência do Usuário, Utilidade Percebida e Influência Social têm relação positiva significante com o uso da Shadow IT, bem como o uso da Shadow IT tem relação positiva significante com o desempenho individual do usuário de TI. Este trabalho traz implicações teóricas e práticas. Para a teoria, esta pesquisa ampliou o conhecimento sobre o uso da Shadow IT a nível individual. Ademais, um instrumento para medir o comportamento de uso da Shadow IT foi desenvolvido, o qual pode ser aplicado nas organizações para conhecer o comportamento do usuário de TI com relação ao uso destas tecnologias. A partir do conhecimento dos antecedentes do comportamento de uso da Shadow IT e qual é a sua relação com o desempenho individual do usuário de TI, os gestores podem elaborar políticas de gestão que reduzam os riscos associados a esse fenômeno, bem como potencializar os seus benefícios. / Given the increasing use of unauthorized technologies by employees in organizations, called Shadow IT, the traditional way to manage technology is changing. Shadow IT is the use of an unauthorized technology by employees, changing, thus, the role of IT is changing within organizations. Motivated by this context, this research aims to verify the antecedents factors behind Shadow IT usage behavior and the relationship of this behavior with the individual performance of IT users. To reach this goal, we performed a survey research with 286 IT users of from the administrative area. These users are employees of three different companies: a public agency, a professional education company and a financial cooperative. As results, we found that User Experience, Perceived Usefulness and Social Influence has positive relationship with Shadow IT usage, as well as the use of Shadow IT has a positive relationship with the individual performance of the IT user. This research has theoretical and practical implications. To the academia, this research has extended knowledge about Shadow IT usage at individual level. Furthermore, we also has developed an instrument to measure the Shadow IT usage behavior, which can be applied to the IT users of companies in order to know their Shadow IT usage behavior. To know the antecedents of Shadow IT usage and what is its relationship with individual performance of IT user is also important to companies. Managers must know what drives users to use Shadow IT, as well as what is the outcome of this use in terms of individual performance in order to develop policies and strategies that reduce the risks associated with this phenomenon and maximize its benefits.
7

Antecedentes do comportamento de uso da Shadow It e sua relação com o desempenho individual

Mallmann, Gabriela Labres January 2016 (has links)
Dado o uso crescente de tecnologias não autorizadas e não suportadas pelo departamento de TI nas organizações, chamadas de Shadow IT, o papel da TI e a forma tradicional de gerenciar tecnologia estão mudando dentro das organizações. Shadow IT refere-se ao uso de tecnologias utilizadas pelos funcionários sem a autorização ou o suporte formal da TI para realizar as tarefas de trabalho. Motivada por este contexto, esta pesquisa tem como objetivo verificar os fatores antecedentes ao comportamento de uso da Shadow IT e a relação deste comportamento com o desempenho individual dos usuários de TI. Para alcançar tal objetivo, foi realizada uma pesquisa survey com 286 usuários de TI da área administrativa. Estes usuários são funcionários de três diferentes empresas: um órgão público, uma empresa de educação profissional e uma cooperativa de crédito, as quais compõe a amostra. Esta pesquisa obteve como resultados que os fatores Experiência do Usuário, Utilidade Percebida e Influência Social têm relação positiva significante com o uso da Shadow IT, bem como o uso da Shadow IT tem relação positiva significante com o desempenho individual do usuário de TI. Este trabalho traz implicações teóricas e práticas. Para a teoria, esta pesquisa ampliou o conhecimento sobre o uso da Shadow IT a nível individual. Ademais, um instrumento para medir o comportamento de uso da Shadow IT foi desenvolvido, o qual pode ser aplicado nas organizações para conhecer o comportamento do usuário de TI com relação ao uso destas tecnologias. A partir do conhecimento dos antecedentes do comportamento de uso da Shadow IT e qual é a sua relação com o desempenho individual do usuário de TI, os gestores podem elaborar políticas de gestão que reduzam os riscos associados a esse fenômeno, bem como potencializar os seus benefícios. / Given the increasing use of unauthorized technologies by employees in organizations, called Shadow IT, the traditional way to manage technology is changing. Shadow IT is the use of an unauthorized technology by employees, changing, thus, the role of IT is changing within organizations. Motivated by this context, this research aims to verify the antecedents factors behind Shadow IT usage behavior and the relationship of this behavior with the individual performance of IT users. To reach this goal, we performed a survey research with 286 IT users of from the administrative area. These users are employees of three different companies: a public agency, a professional education company and a financial cooperative. As results, we found that User Experience, Perceived Usefulness and Social Influence has positive relationship with Shadow IT usage, as well as the use of Shadow IT has a positive relationship with the individual performance of the IT user. This research has theoretical and practical implications. To the academia, this research has extended knowledge about Shadow IT usage at individual level. Furthermore, we also has developed an instrument to measure the Shadow IT usage behavior, which can be applied to the IT users of companies in order to know their Shadow IT usage behavior. To know the antecedents of Shadow IT usage and what is its relationship with individual performance of IT user is also important to companies. Managers must know what drives users to use Shadow IT, as well as what is the outcome of this use in terms of individual performance in order to develop policies and strategies that reduce the risks associated with this phenomenon and maximize its benefits.
8

Antecedentes do comportamento de uso da Shadow It e sua relação com o desempenho individual

Mallmann, Gabriela Labres January 2016 (has links)
Dado o uso crescente de tecnologias não autorizadas e não suportadas pelo departamento de TI nas organizações, chamadas de Shadow IT, o papel da TI e a forma tradicional de gerenciar tecnologia estão mudando dentro das organizações. Shadow IT refere-se ao uso de tecnologias utilizadas pelos funcionários sem a autorização ou o suporte formal da TI para realizar as tarefas de trabalho. Motivada por este contexto, esta pesquisa tem como objetivo verificar os fatores antecedentes ao comportamento de uso da Shadow IT e a relação deste comportamento com o desempenho individual dos usuários de TI. Para alcançar tal objetivo, foi realizada uma pesquisa survey com 286 usuários de TI da área administrativa. Estes usuários são funcionários de três diferentes empresas: um órgão público, uma empresa de educação profissional e uma cooperativa de crédito, as quais compõe a amostra. Esta pesquisa obteve como resultados que os fatores Experiência do Usuário, Utilidade Percebida e Influência Social têm relação positiva significante com o uso da Shadow IT, bem como o uso da Shadow IT tem relação positiva significante com o desempenho individual do usuário de TI. Este trabalho traz implicações teóricas e práticas. Para a teoria, esta pesquisa ampliou o conhecimento sobre o uso da Shadow IT a nível individual. Ademais, um instrumento para medir o comportamento de uso da Shadow IT foi desenvolvido, o qual pode ser aplicado nas organizações para conhecer o comportamento do usuário de TI com relação ao uso destas tecnologias. A partir do conhecimento dos antecedentes do comportamento de uso da Shadow IT e qual é a sua relação com o desempenho individual do usuário de TI, os gestores podem elaborar políticas de gestão que reduzam os riscos associados a esse fenômeno, bem como potencializar os seus benefícios. / Given the increasing use of unauthorized technologies by employees in organizations, called Shadow IT, the traditional way to manage technology is changing. Shadow IT is the use of an unauthorized technology by employees, changing, thus, the role of IT is changing within organizations. Motivated by this context, this research aims to verify the antecedents factors behind Shadow IT usage behavior and the relationship of this behavior with the individual performance of IT users. To reach this goal, we performed a survey research with 286 IT users of from the administrative area. These users are employees of three different companies: a public agency, a professional education company and a financial cooperative. As results, we found that User Experience, Perceived Usefulness and Social Influence has positive relationship with Shadow IT usage, as well as the use of Shadow IT has a positive relationship with the individual performance of the IT user. This research has theoretical and practical implications. To the academia, this research has extended knowledge about Shadow IT usage at individual level. Furthermore, we also has developed an instrument to measure the Shadow IT usage behavior, which can be applied to the IT users of companies in order to know their Shadow IT usage behavior. To know the antecedents of Shadow IT usage and what is its relationship with individual performance of IT user is also important to companies. Managers must know what drives users to use Shadow IT, as well as what is the outcome of this use in terms of individual performance in order to develop policies and strategies that reduce the risks associated with this phenomenon and maximize its benefits.
9

Monitoring software usage and usage behaviour based on SaaS data: case Gemini Water portfolio

Bredberg, August January 2023 (has links)
Software as a Service (SaaS) platforms paired with cloud-based storage is a common schema used among software providers across the globe. Such solutions usually accumulate vast amounts of usage and usage behaviour data. Utilizing this data in the form of monitoring solutions can potentially generate great value for both software users and software providers. Swedish authorities have taken a restrictive standpoint against incorporating cloud-based storage solutions into software used in the public sector. The project aims to identify a practical and reusable way of utilizing cloud data and to demonstrate to Swedish authorities how cloud-based storage models can be beneficial. The case of this project is the SaaS solution Gemini Portal+, a water and sewage management solution. The end result was a monitoring module to Gemini Portal+ where users can view the digital maturity of their Gemini Portal+ usage. The digital maturity is conveyed in an easily digested manner, with concrete and actionable information on how to increase digital maturity. The result has passed the requirements and stakeholders are satisfied with the result.
10

An Exploratory Study on the Interrelationship of Internet Addiction, Internet Usage Motivation, Internet Usage Behavior and User Characteristics for Taiwan High School Students.

Tung, Chieh-Ju 12 June 2003 (has links)
An Exploratory Study on the Interrelationship of Internet Addiction, Internet Usage Motivation, Internet Usage Behavior and User Characteristics for Taiwan High School Students. Chieh-Ju Tung Abstract The purpose of this study was to examine the interrelationship among motivation and gratification level, activities, personality and Internet addiction for Taiwan¡¦s high school students based on the Uses and Gratifications Theory. The characteristics of those identified as addicted are investigated along with the factors of demographic data, motivation and gratification, web attitude and personality. Moreover, structural equation modeling was used to verify the Theory. The study was conducted using purposive sampling at two major municipals in Taiwan. Questionnaires including Pathological Internet Use Scale for Taiwan high school student, Diagnoistic Questionnaires, Internet usage Motivation and Gratification Scale, Interpersonal Relationship Scale, Self-Esteem Scale, Center for Epidemiologic Studies Depression Scale, Internet Usage Behavior Questionnaire, Perceptions of the Internet Influences and Demographic Data. Of the 1708 qualified samples, 236 were classified as Internet addicted. Major findings of the study are: 1. Entertainment is the major factor for high school students to use Internet, information searching stands as second. Surfing with motivation of social and entertainment has positive correlation with Internet addiction. Those classified as addicted have higher motivation on social and entertainment and have higher satisfaction thereafter. 2. Males who own computer, with grades in lower two-thirds of the class, with more than 4 years Internet usage experience, always using cyber-café or surfing during weekday have higher tendency to become addicted. 3. System and location of school, the grade attended or whether access Internet at home have no relationship with addiction. 4. The average weekly hours on Internet is positive correlated with Internet addiction. 5. Students with personality of dependence, shyness, depression or lower self-esteem have higher tendency to become addicted. 6. The probability of males to become addicted is 2.6 times that of females. Vocational high school students have higher tendency to become addicted than non-vocational high school students. 7. The average weekly hours on Internet for those addicted is 21.2 hours, it¡¦s 1.75 times that of normal ones. 8. Those identified as addicted always surf in cyber-café and favor on-line games, chat room and sex-related activities. 9. Those identified as addicted have lower self-esteem and higher depression. 10. Internet addiction has significant canonical correlation with motivation on social/entertainment and hours on Internet. 11. Internet addiction has significant canonical correlation with shyness, depression emotion, poor interpersonal relationship, negative self-concept and lower self-esteem. 12. The theoretical model constructed in this study could explain the relationship among main variables by Amos. 13. ¡§Internet usage motivation¡¨ has greatest direct effect on addiction. It has greatest total effect when combines with the factor of ¡§Average weekly hours on Internet ¡¨. 14. The predictability for Internet addiction is 62% when six variables were used (Motivation on social, Motivation on entertainment, Average weekly hours on Internet, Interpersonal relationship, Depression and Self-esteem). Finally, suggestions on counseling addicted students are made for government and high school authorities, counselors and parents. Issues for futher study are also discussed.

Page generated in 0.0546 seconds