Search results

1 – 10 of 19
Article
Publication date: 15 January 2018

Po-Hong Shih, Keng-Chieh Yang and Chyan Yang

Although numerous studies have examined factors that influence smartphone acceptance and use, few have analyzed cognitive age. This study aims to use the unified theory of…

Abstract

Purpose

Although numerous studies have examined factors that influence smartphone acceptance and use, few have analyzed cognitive age. This study aims to use the unified theory of acceptance and use of technology (UTAUT) to test two models to analyze the moderating effect of cognitive age. This research offers relevant suggestions among different cognitive age groups.

Design/methodology/approach

A questionnaire survey was conducted to collect research data in Taiwan and the UTAUT model was used. Model 1 ensures all four antecedent constructs among digital natives (those under 34 years old). Model 2 divides the digital immigrants into two groups to test the influence of cognitive age on the behaviors of smartphone use. This study tests Model 1 using AMOS 20 to examine the measurement and structural model and validates Model 2 using partial least squares (PLSs).

Findings

In Model 1, the digital natives have sufficient confidence to accept a new technology with ease and little effort owing to most educational resources and the widespread internet. Group 1 in Model 2 reveals that the behavior of digital immigrants is similar to that of digital natives. For Group 2 in Model 2, they tend to infer that skills or tasks they associate with having higher value are more difficult to learn.

Originality/value

This study provides another dimensional result for different cognitive age groups and it has to consider not only chronological age but also cognitive age in user behavior. The result can enrich the theoretical perspective on technology adoption and use behavior via cognitive age, which is a significant and important self-related factor that can help predict technology adoption and use behavior.

Details

Kybernetes, vol. 47 no. 3
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 1 April 2003

Hsiao‐Tieh Pu and Chyan Yang

This paper explores the possibility of adding user‐oriented class associations to hierarchical library classification schemes. Some highly associated classes not grouped in the…

1989

Abstract

This paper explores the possibility of adding user‐oriented class associations to hierarchical library classification schemes. Some highly associated classes not grouped in the same subject hierarchies, yet relevant to users’ knowledge, are automatically obtained by analyzing a two‐year log of book circulation records from a university library in Taiwan. The library uses the Chinese Decimal Classification scheme, which has similar structure and notation to the Dewey Decimal Classification. Methods, from both collaborative filtering and information retrieval research, were employed and their performance compared based on similarity estimation of classes. The results show that classification schemes can, therefore, be made more adaptable to changes of users and the uses of different library collections by analyzing the circulation patterns of similar users. Limitations of the methods and implications for applications are also discussed.

Details

The Electronic Library, vol. 21 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 28 January 2014

Hsiu-Kuei Kuo and Chyan Yang

The purpose of this paper is to show that by exploring the intellectual structure of activity-based costing (ABC) based on the citation database of Google Scholar, one can…

1259

Abstract

Purpose

The purpose of this paper is to show that by exploring the intellectual structure of activity-based costing (ABC) based on the citation database of Google Scholar, one can understand the evolution and core ideas of the ABC discipline.

Design/methodology/approach

This study employs the document co-citation method to model the intellectual structure of ABC between 1988 and 2008. After an initial co-citation analysis of the condition-limited literature set to find the relationships between core articles, this study further implements multivariate statistical techniques to construct representations for the ABC intellectual structure.

Findings

A total of four important subjects chronologically provide a panoramic view of the evolution of ABC. This study finds some dimensions of the results to be in accordance with prior research, but further achieves insights into the core ideas underpinning the ABC discipline. It demonstrates the validity of this study conducting a co-citation analysis based on the citation data of Google Scholar.

Research limitations/implications

The classification, core articles, and evolution of the ABC literature published in the past two decades benefit academic researchers conducting future studies that build systematically on prior research.

Practical implications

The intellectual structure of the ABC discipline explains and predicts the stages of ABC implementation's life cycle. For the accounting profession, this helps a consultant/practitioner in sub-fields of the ABC domain to quickly and easily enlarge the coverage and viewpoints or perspectives within his/her cluster of interest and to jointly consider the successful factors of implementing ABC in an organization.

Originality/value

The empirical feasibility of using digitally archival information to model an intellectual structure of ABC is attained; and the intellectual structure and its various representations provide researchers, consultants, and practitioners with a macroscopic and dynamic view of the ABC discipline.

Article
Publication date: 17 April 2007

Chyan Yang, Keng‐Chieh Yang and Hsu‐Chieh Yuan

The purpose of this research is to describe an efficient search methodology to help improve the search results in the top portion of a lengthy search list. When facing a lengthy…

1465

Abstract

Purpose

The purpose of this research is to describe an efficient search methodology to help improve the search results in the top portion of a lengthy search list. When facing a lengthy search list, people often limit themselves to the top ten items on the list, even though there may be more useful information after the top ten items.

Design/methodology/approach

This study proposes an ontology‐based adaptive semantic search to significantly improve the search experience. To capture the semantic difference of search terms, naïve ontology is used to store the relationship among terms. Before a search term is processed by the search engine Lucene, the related words of the search term are selected from ontology structures to form new query phrases in the process of query expansion. The weighting of the expanded query phrases is dynamically learned by observing the users' clicking behaviors.

Findings

Research results show that with the aid of ontology the average precision rate of all cases is dramatically higher than the precision rate for the default search result. Even in the worst cases, in some situations, this ontology is still close to the precision rate for the default search result.

Originality/value

This paper shows how it is possible to improve the precision rate of items retrieved after a search and thus avoid information overload.

Details

The Electronic Library, vol. 25 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 29 March 2013

Tsui‐Chuan Hsieh, Keng‐Chieh Yang, Conna Yang and Chyan Yang

The purpose of this article is to investigate urban and rural differences for online activities and e‐payment behavior patterns.

2752

Abstract

Purpose

The purpose of this article is to investigate urban and rural differences for online activities and e‐payment behavior patterns.

Design/methodology/approach

This study applied the MLCA model to investigate Internet usage patterns from 11 online applications among 10,909 Taiwan residents in 25 different regions.

Findings

The results showed that online behavior patterns exhibited regional differences, as the regional segments affected the individual segments of different use patterns. For instance, the urban area comprised a higher proportion of members who were accustomed to internet applications and skilled in online shopping by using a credit card. The rural area made up a higher proportion of members who only occasionally used online services. Moreover, rural region residents used other payment methods (excluding credit cards) more often than urban region residents. As expected, users’ personal characteristics also dictated the online behavior pattern. For instance, people with higher‐level income spent relatively more money for online shopping and often used various internet applications than others.

Practical implications

The findings herein should help Internet service providers form an applicable guideline for developing service strategies of higher service satisfaction regarding products and users’ needs.

Originality/value

This study implemented a multilevel latent class model to investigate online behavior patterns that exhibited urban and rural differences, with the goal of providing service providers an understanding and mastery of their target users.

Article
Publication date: 13 February 2009

Chyan Yang, Hsien‐Jyh Liao and Chung‐Chen Chen

The purpose of this paper is to explain the Creative Common license (CC license) a digital copyright license, which can clearly express the scope of copyright granted by the…

1302

Abstract

Purpose

The purpose of this paper is to explain the Creative Common license (CC license) a digital copyright license, which can clearly express the scope of copyright granted by the owners and therefore help users, including crawlers and software robots, to comprehend the scope of authority and then collect digital contents via the internet legally. However, both the complex format and difficulty in embedding the digital codes in a binary file impede the spread of CC licenses. This paper seeks to propose a new protocol CCFE, based on the CC license, to solve the above problems.

Design/methodology/approach

Instead of embedding the CC licensing information in the body of a CC file, CCFE attaches the authentication information in the file extension. The syntax of CCFE to verify the validity of CCFE is illustrated.

Findings

CCFE allows the authorization data to be embedded and is consequently preserved in the process of duplication and transmission. Thus the portability of the authentication method is magnified. In addition, users can use general search engines, like Google, to find the CC licensed documents.

Originality/value

The paper points out the disadvantages of the current CC license and explains a new protocol. Furthermore, it explains how this new paradigm can be used for constructing an online digital library and how librarians can use software robots to collect digital contents on the internet within copyright guidelines.

Details

The Electronic Library, vol. 27 no. 1
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 19 June 2007

Chyan Yang and Hsueh‐Chuan Yen

To provide the knowledge structure for an effective knowledge‐based organization which integrates knowledge into organizational goals.

2143

Abstract

Purpose

To provide the knowledge structure for an effective knowledge‐based organization which integrates knowledge into organizational goals.

Design/methodology/approach

The structure, function, and process of a viable organization were discussed which provided a basis to construct a knowledge management (KM) framework and demonstrate knowledge structure in a knowledge‐based organization. Based on systems view and viable systems model (VSM), a range of recently published KM practices were reviewed to position various knowledge content.

Findings

This study proposed a viable systems framework for organizational KM based on the VSM of Beer. Using the viable systems framework, organizational knowledge can be classified into four categories. Knowledge content was articulated based on the systems view. Thus, knowledge structure of various management hierarchies can be captured.

Originality/value

The result contributes to the practice of knowledge executive by supporting the diagnosis and design of an effective knowledge‐based organization. The framework also provides a basis for future empirical studies on the relationships between KM strategies and organizational effectiveness. A specific KM strategy exists that can maximize the effectiveness of each of the four types of knowledge.

Details

Kybernetes, vol. 36 no. 5/6
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 1 November 2006

Chyan Yang, Liang‐Chu Chen and Chun‐Yen Peng

This paper seeks to establish an extraction system for an information technology (IT) product specification named ITSIES which combines the natural language process (NLP) with the…

Abstract

Purpose

This paper seeks to establish an extraction system for an information technology (IT) product specification named ITSIES which combines the natural language process (NLP) with the ontology concept and also to evaluate the system's effectiveness in advance.

Design/methodology/approach

The development of the system is based on a prototype design and performance validation. This study adopts four classes of IT specification (PC, Unix server, Monitor, and Printer) that follow IBM's and HP's product lines as the baseline information in order to construct the extraction system in GATE (General Architecture for Text Engineering) tools and to examine the IT product specification with other brands and patterns. Additionally indices are adopted such as precision, recall, and F‐measure as the matrices for evaluating system performance.

Findings

The performance shows that the average recall, precision, and F‐measure are all over 90 per cent, revealing that the JAPE (Java Annotation Patterns Engine) grammar rules in the IT domain are reasonably good and generally in line with expectations.

Originality/value

The paper proposes an integrative framework to examine IT product specification information and demonstrates that the system is effective for IT application.

Details

The Electronic Library, vol. 24 no. 6
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 9 March 2010

Chyan Yang and Hsien‐Jyh Liao

The Robots.txt and Robots Meta tags constitute a set of instruments that can be used to instruct software robots. However, the current version of Robots.txt and Robots Meta tags…

Abstract

Purpose

The Robots.txt and Robots Meta tags constitute a set of instruments that can be used to instruct software robots. However, the current version of Robots.txt and Robots Meta tags are both too simple and ambiguous in an internet world with many potential conflicts, especially in terms of copyright and trespass to chattels. This paper seeks to propose an amendment to the Robots.txt and Robots Meta tags to solve the problems.

Design/methodology/approach

Instead of following personal experience, this paper surveys several predominant cases in an attempt to find general principles that can be used as guidelines to amend the Robots.txt and Robots Meta tags.

Findings

According to several court cases, the Robots.txt and Robots Meta tags can not only be used to simply allow or refuse the software robots, but also expressing the online copyright authorization policies of webmasters. Any robot following the given policies can prevent possible conflicts, and undoubtedly, any robot ignoring these may be in breach of the law. In terms of adapting to their new roles successfully, the Robots.txt and Robots Meta tags need some supplements and adoption; as a result, the webmasters can express their will more explicitly and avoid unnecessary disputes in relation to copyright authorization scope and trespass to chattels as well.

Originality/value

This paper reveals the new function of the Robots.txt and Robots Meta tags. Based on this new function, this paper points out the disadvantages of the current Robots.txt and Robots Meta tags and proposes new a comprehensive amendment based on this new function.

Details

Library Hi Tech, vol. 28 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 10 February 2012

Jung‐Jung Chang and Chyan Yang

The goal of this study is to gather information from library patrons to answer the questions of whether real‐time reference services (instant messaging, IM) are beneficial to…

1023

Abstract

Purpose

The goal of this study is to gather information from library patrons to answer the questions of whether real‐time reference services (instant messaging, IM) are beneficial to patrons and how valuable they are to fulfilling their task needs. The study was designed to elicit information about how patrons were dealing with the rapidly changing technological environment, and how helpful they felt IM reference services were to them.

Design/methodology/approach

The investigation uses the technology acceptance model (TAM) as the basic framework and extends it by the variable of perceived relevance (PR) which intends to extend understanding of the adoption of IM services. The sample consisted of three university libraries' patrons on the basis of convenience, and 323 usable responses were obtained.

Findings

This research found general support for TAM. Specifically, the findings show that perceived ease of use of IM services is the key factor for the patrons' attitudes about the IM service. Overall, the model explained 58 percent of the variance in behaviour intention. Thus, the results show that the proposed model does satisfactorily explain the adoption of the IM service.

Originality/value

The findings of this research provide some useful insights into a patron's behavioural intention toward adoption of an IM service which will stimulate thought about real‐time reference services that could be offered by other libraries. And it will be valuable for better understanding of factors affecting the determinants of IM acceptance, which allows libraries to devise more effective approaches to improving the patrons' perceptions of a target system and thereby boost subsequent acceptance of the system.

Details

The Electronic Library, vol. 30 no. 1
Type: Research Article
ISSN: 0264-0473

Keywords

1 – 10 of 19