22 research outputs found

    The Impact of Motivation and Prevention Factors on Game Addiction

    Get PDF
    Adolescents\u27 addiction to game has a negative impact on the aberrance of adolescents. Although limited research has been done on the cause of game addiction, no research has been conducted on the effectiveness of prevention measures. In this paper, we propose a model to study the impact of both the motivation and prevention factors on game addiction. Surveys were conducted among middle school students in Shanghai, with 623 valid responses. The analysis results show that among all prevention factors, only attention switch has significant negative impact on game addiction, however, dissuasion and parental monitoring have positive correlation with game addiction. The rational, resource shortage and cost have no significant impacts on game addiction. The analysis results also show that among all motivation factors, mechanics, relationship and escapism have significant positive impact on addiction

    A Project-Based Model for Implementing BPR

    Get PDF
    Business process reengineering (BPR) is an outstanding management theory but with a high failure rates of 70%. One of the major problems in many BPR efforts is lacking of a disciplined method to model business process. In addition, the implementation methodologies in past literature and famous consulting firms were incomplete, and lack of practical experience or academic foundation. After analyzing and comparing the pros and cons of several representative BPR implementation methodologies, this study proposes a new methodology which combines previous academic outcomes and practical experience in consulting firms. Based on a hands on project, the detailed approaches, targets, needful materials, and expected results of each stage are elaborated as well as the commonly used BPR techniques and tools. Furthermore, the innovative methods and steps in this methodology which ensure the success of the project are discussed

    A CONCEPTUAL FRAMEWORK FOR MOBILE GROUP SUPPORT SYSTEMS

    Get PDF
    The rapid development of wireless communication and mobile devices has created a great opportunity to support mobile group coordination at a more efficient level than before. This article presents a framework for Mobile Group Support Systems (MGSS) that considers four dimensions: supporting whom, supporting what, where to support and how to support. A good MGSS design should take consideration with the characteristics of each dimension: the system should be able to support mobile users working jointly with members from multiple parties; using available and advanced mobile technology, the system should be able to support context freedom, context dependent, and ad hoc coordination under dynamic, uncertain, frequent disrupting, time and space stretched and fluid context. To meet these requirements, we discuss the issues related to three basic functions of MGSS: mobile communication, group coordination, and context awareness

    Why College Students Commit Computer Hacks: Insights from a Cross Culture Analysis

    Get PDF
    Computer hacking committed by young adults has become an epidemic that threatens the social and economic prosperity brought by information technology around the world. In this study, we extend previous studies on computer hackers with a cross cultural approach by comparing sources of influence on computer hacking in two countries: China and the United States. This comparative study yielded some significant insights about the contributing factors to the computer hacking phenomenon in these two countries. While some factors are consistent, others are distinctly different, across the two samples. We find that moral beliefs about computer hacking are the most consistent antidote against computer hacking intentions among the Chinese and the American college students. On the other hand, we find that playing computer games (team sports) significantly increases (decreases) the intention to computer hacking in the Chinese college students, but has no significant effect on the American college students. In addition, we find that hypotheses based on routine activity and self-control theories are modestly supported by the two samples; however, each sample supports distinct dimensions of the two theories. Hofstede’s national cultural framework provides salient explanations to these differences in the two samples

    Why Individuals Commit Computer Offences in Organizations: Investigating the Roles of Rational Choice, Self-Control, and Deterrence

    Get PDF
    Computer offences and crimes against corporate computer systems have increasingly become a major challenge to information security management in the Internet-enabled global economy and society. In this study, we attempt to develop a theoretical model that integrates three main stream criminology theories, i.e., general deterrence, rational choice, and individual propensity. We submit that, while the main decision process leading to an offensive act may be explained by the rational choice theory, self-control and deterrence factors could significantly alter the risk-benefit calculus assumed in the rational choice model. Using data collected from employees in multiple organizations, we tested our model using structural equation modelling techniques. We found that the perceived benefits of offensive acts dominate the rational calculus in individuals, and that the low self-control significantly impacts the perceived benefits and risks, thus playing a major role in the computer offences perpetrated by individuals in organizational settings. In addition, we found that deterrence only has limited impact on the offensive intentions through increased perceived risks. By integrating multiple theories into one seamless model, we hope to provide better understanding of computer offences and deeper insights for improving information security management practices

    Neural variability fingerprint predicts individuals’ information security violation intentions

    No full text
    As the weakest links in information security defense are the individuals in an organizations, it is important to understand their information security behaviors. In the current study, we tested whether the neural variability pattern could predict an individual's intention to engage in information security violations. Because cognitive neuroscience methods can provide a new perspective into psychological processes without common methodological biases or social desirability, we combined an adapted version of the information security paradigm (ISP) with functional magnetic resonance imaging (fMRI) technology. While completing an adapted ISP task, participants underwent an fMRI scan. We adopted a machine learning method to build a neural variability predictive model. Consistent with previous studies, we found that people were more likely to take actions under neutral conditions than in minor violation contexts and major violation contexts. Moreover, the neural variability predictive model, including nodes within the task control, default mode, visual, salience and attention networks, can predict information security violation intentions. These results illustrate the predictive value of neural variability for information security violations and provide a new perspective for combining ISP with the fMRI technique to explore a neural predictive model of information security violation intention

    Joint Optimization of Data Freshness and Fidelity for Selection Combining-Based Transmissions

    No full text
    Motivated by big data applications in the Internet of Things (IoT), abundant information arrives at the fusion center (FC) waiting to be processed. It is of great significance to ensure data freshness and fidelity simultaneously. We consider a wireless sensor network (WSN) where several sensor nodes observe one metric and then transmit the observations to the FC using a selection combining (SC) scheme. We adopt the age of information (AoI) and minimum mean square error (MMSE) metrics to measure the data freshness and fidelity, respectively. Explicit expressions of average AoI and MMSE are derived. After that, we jointly optimize the two metrics by adjusting the number of sensor nodes. A closed-form sub-optimal number of sensor nodes is proposed to achieve the best freshness and fidelity tradeoff with negligible errors. Numerical results show that using the proposed node number designs can effectively improve the freshness and fidelity of the transmitted data
    corecore