• Title/Summary/Keyword: 개인정보관리모델

Search Result 349, Processing Time 0.028 seconds

Exploring the Effect of Gamification and Privacy Concerns upon Behavioural Intention to Use Fitness Apps (게임화 및 개인정보 염려가 피트니스 앱 사용의도에 미치는 영향)

  • Melisa Gunhan;Hyojung Song;Taeha Kim
    • Information Systems Review
    • /
    • v.26 no.2
    • /
    • pp.185-203
    • /
    • 2024
  • This study empirically explores the influence of gamification elements and privacy concerns on users' intention to use fitness apps, based on the technology acceptance model (TAM). This research classifies gamification in fitness apps into three categories: achievement-related elements, social-related elements, and immersion-related elements. Although previous research investigated the gamification of fitness apps, few studies combined the impact of gamification with privacy concerns. Considering the significant amount of sensitive personal data collected by fitness apps, we recognize the importance of data privacy and aim to address this gap in research. To achieve this goal, we collected and analyzed data from 187 Korean fitness app users through an online questionnaire. The results confirm the highly significant influence of perceived ease of use, perceived usefulness, and achievement-related gamification elements. Social-related gamification elements, immersion-related gamification elements, and privacy concerns however show insignificant results for the intention to use fitness apps in the Korean market. Location and time limit the generalizability of this study; however, the findings of this study nonetheless offer valuable insights for practitioners and developers to enhance the design and development of their applications.

Generalized On-Device AI Framework for Semantic Segmentation (의미론적 분할을 위한 범용 온디바이스 AI 프레임워크)

  • Jun-Young Hong;Kyung-Jae Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.5
    • /
    • pp.903-910
    • /
    • 2024
  • Complex semantic segmentation tasks are primarily performed in server environments equipped with high-performance graphics hardware such as GPUs and TPUs. This cloud-based AI inference method operates by transmitting processed results to the client. However, this approach is dependent on network communication and raises concerns about privacy infringement during the process of transmitting user data to servers. Therefore, this paper proposes a Generalized On-Device Framework for Semantic Segmentation that can operate in mobile environments with high accessibility to people. This framework supports various semantic segmentation models and enables direct inference in mobile environments through model conversion and efficient memory management techniques. It is expected that this research approach will enable effective execution of semantic segmentation algorithms even in resource-constrained situations such as IoT devices, autonomous vehicles, and industrial robots, which are not cloud computing environments. This is expected to contribute to the advancement of real-time image processing, privacy protection, and network-independent AI application fields.

Design of Location Based Social Network Service Model Centering around Smart Phone (스마트 폰 중심의 위치 기반 소셜 네트워크 서비스 모델 설계)

  • Ahn, Byung-Ik;Joo, Young-Do
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.5
    • /
    • pp.55-62
    • /
    • 2011
  • Recently, LBS(Location Based Service) is expanding its service areas with the spread of smart phones and the contents of the service are more individualized according to the customer's needs. Specially, LBSNS(Location Based Social Network Service) is emerging as the most promising service of LBS. This paper introduces a LBSNS model to form a community to share common contents dynamically centering around the place of user's smart phone. The methodology suitable for implementing the effective management and the automatic update of the community of social network is presented in this paper. In addition, we describe the significant future researches of LBSNS under the upcoming mobile environment.

Analysis on Factors Influencing the Path to Use Information Technology in Public Organization (공공부문 구성원의 정보기술 사용경로와 영향요인 분석: 심리적 대응이론을 적용한 구조적 분석)

  • Lee, Cheoul-Joo
    • Information Systems Review
    • /
    • v.12 no.2
    • /
    • pp.47-74
    • /
    • 2010
  • This study presents two dimensional views of IT-use behaviors. It examines public employee's IT-use behavior as manifested in two ways: acceptance on IT, utilization on IT. This study investigates levels of employee's the acceptance and utilization on IT in the Korean Central Government(ministry and agency) and analyses factors affecting public employee's the acceptance and utilization on task-related IT in the public sector. This study tries to examine the variables affecting the acceptance and utilization on IT; especially, the influences of such variables as leadership, task-related communication with people, task motivation, IT usability and ease of uses, task understanding in the context of Korean Central Government. Based on a questionnaire survey in Korean Central Government(8 ministries, 5 agencies) that have implemented Government Knowledge Management System(GKMS), 311 valid instruments were received and analyzed using various statistics and structural equation model(SEM). And this study will adopt try to delineate pre and intervening conditions for public employee's the acceptance and utilization. According to the results of interviews and SEM analysis suggests that the influence of task-understanding, organizational communication, IS usability were statistically significant in the acceptance and utilization on IT. And it is also hoped that the path-analytic model suggested in this study helps reveal the causal chains between the acceptance and the utilization. Especially, task-understanding proves to be important in encouraging public employee's the acceptance and utilization. This result illustrates why task-understanding people are the key to utilize the task-related IT in public organization.

u-Parking Service Model and Study on the u-City-Linkage (u-Parking 서비스 모델 및 u-City 연계에 관한 연구)

  • Choi, Seung-Hak;Roh, Su-Sung;Kim, Do-Nyun
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2010.05a
    • /
    • pp.68-73
    • /
    • 2010
  • 도심내 지속적인 차량증가에 따라 도시의 주차문제는 운전자에게 있어 과거부터 현재까지 여전히 불편함을 주고 있다. 이에 유비쿼터스 기술을 이용한 주차시스템이 활발히 연구중이며, 센서를 이용한 새로운 형태의 주차장이 생겨나고 있다. 따라서, 본 논문에서는 국내 사례 및 선행연구의 검토를 통해 시사점을 도출하였고, 더욱 더 발전된 모바일을 기반으로 한 유비쿼터스 기술을 적극 활용하여 능동적이고 개인 맞춤형의 통합 주차서비스가 가능한 지능형 u-Parking시스템을 제안하였으며, 개별 운영관리의 비효율성을 u-City의 통합운영센터와의 연계를 통하여 효율적 방법을 제시하였다. 또한 주차장 스마트 검색, 인터넷 주차장 예약제, 경로연계 맞춤형 정보제공 등 u-서비스 비즈니스 모델 제시를 통하여 효율성과 경제성을 확보방안을 마련하였다.

  • PDF

A Study on the User Acceptance Model of Artificial Intelligence Music Based on UTAUT

  • Zhang, Weiwei
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.25-33
    • /
    • 2020
  • In this paper, the purpose is to verify the impact of performance expectations, effort expectations, social impact, individual innovation and perceived value on the intent of use and the behavior of use. Used Unified Theory of Acceptance and Use of Technology (UTAUT) to verify the applicability of this model in China, and established the research model by adding two new variables to UTAUT according to the situation of the Chinese market. To achieve this goal, 345 questionnaires were collected for experienced music creators using artificial intelligence nuggets in China by means of Internet research. The collected data were analyzed through frequency analysis, factor analysis, reliability analysis, and structural equation analysis through SPSS V. 22.0 and AMOS V 22.0. The verification of the hypotheses presented in the research model identified the decisive influence factors on the use of artificial intelligence music acceptance by Chinese users. The study is innovative in that it attempts to verify the applicability of UTAUT in the Chinese context. In the construction of the user acceptance model of AI music, three influencing factors will have an effect on users' intentions, and according to the degree of effect, from largest to smallest, they are respectively Perceived Innovativeness, Performance Expectancy and Effort Expectancy. This paper will also provide some management advices, i.e. improving the utility and usability of AI music, encouraging users with individual innovativeness, developing competitive and attractive pricing policies, increasing publicity, and prioritizing word-of-mouth advertising.

Impacts of Perceived Value and Trust on Intention to Continue Use of Individuals' Cloud Computing: The Perception of Value-based Adoption Model (클라우드 컴퓨팅의 지각된 가치와 신뢰가 지속적 사용의도에 미치는 영향: 가치기반수용모델을 기반으로)

  • Kim, Sanghyun;Park, Hyunsun;Kim, Bora
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.77-88
    • /
    • 2021
  • Cloud computing is getting a lot of attention by many people and businesses due to IT environmental changes such as the proliferation of smart devices, the increase of digital data, and the cost of IT resources. More individuals use personal cloud computing services for storing and managing information and data. Therefore, this study proposed determinants that are expected to have an influence on evaluating the value of cloud computing based on the value-based adoption model, examining the relationship between the continuous use intention of cloud computing. Results of the study show that usefulness, convenience of information access, extensibility had a positive impact on perceived value while privacy concerns and costs had a negative impact on perceived value. In addition, perceived value was found to have a significant effect on the intention to continue use of cloud computing. Finally, trust was found to have a significant effect on the perceived value and the intention to continue use of cloud computing. The findings are expected to provide useful information for understanding the factors that individual users consider important in the steadily growing cloud computing market.

Redactable Blockchain Based Authority Alteration and Accessn Control System (수정 가능한 블록체인 기반 권한 변경 및 접근 제어시스템)

  • Lee, Yeon Joo;Choi, Jae Hyun;Noh, Geontae;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.513-525
    • /
    • 2022
  • The immutability of blockchain is core elements of security of blockchain and guarantee data integrity. However, the characteristic that the data recoreded once in the blockchain cannot be modified has place for abuse by a specific user. In fact improper contents that is inappropriate to be recorded on the blockchain, such as harmful data and user personal data, is exposed on Bitcoin. As a way to manage improper content existing in the blockchain, there is a redactable blockchain using chameleon hash proposed for the first time by Ateniese. The redactable blockchain meet the right to be forgotten of GDPR by allowing data modification and deletion. Recently, Research on personal data management is being conducted in a redactable blockchain. Research by Jia et al. proposed a model that enables users to manage their personal data in the redactable blockchain. However, semi trusted regulators, which are blockchain participation nodes, have powerful authority in the blockchain, such as modification rights and deprivation of transaction rights for all blocks, which may cause side effects. In this paper, to weaken the authority of regulators in Y. Jia et al., we propose a method of authority subject altering and authority sharing, and propose a redactable blockchain-based authority change and access control system model based on applicable scenarios.

Nexus based Quality Inspection Support Model for Defect Prevention of Architectural Finishing Works (하자예방정보 넥서스 기반 건축마감공사 품질점검 지원 모델)

  • Lee, Hye-Rin;Cho, Dong-Hyun;Park, Sang-Hun;Koo, Kyo-Jin
    • Korean Journal of Construction Engineering and Management
    • /
    • v.18 no.5
    • /
    • pp.59-67
    • /
    • 2017
  • At the completion of the construction, various finishing processes are concentrated. This imposes a burden on the on-site manager and imposes on experience based quality control, thereby causing deviations in the quality of construction depending on supervisor or worker's individual competence. In addition, the information related to quality control is frequently scattered in various types of documents such as specifications and drawings, and checkpoints are frequently omitted. It is necessary to provide a tool that can effectively provide the practitioner before or during the inspection work by systematically storing the information related to the defect prevention and linking them in a mutually referential state. This paper proposes an quality inspection support model that can systematically store necessary information on activity or room basis for the quality check of the apartment house finishing work. Establish a defect prevention information base and a information nexus by linking specifications, design standards, checklists, regulations, defect cases, and drawings to the finishing process and the rooms. Based on this, information registration and search interface are presented. It can contribute to securing a certain level of construction quality or more by suggesting a frame that can be utilized by linking various defects prevention information with the focus on closing activity and room.

A Study on Security Framework for Cloud Computing (클라우드 컴퓨팅 보안 프레임워크 연구)

  • Park, Jun-Young;Na, Sang-Ho;Huh, Eui-Nam
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1807-1810
    • /
    • 2010
  • 클라우드 컴퓨팅 서비스는 새로운 컴퓨팅 기술의 패러다임으로 주목 받으면서 단기간에 많은 발전을 이루고 있다. 하지만 상업적인 목적으로 클라우드 컴퓨팅 서비스 제공을 위한 연구가 비약적으로 이루어지면서 각 서비스 영역에서 필요한 데이터 보호와 개인 정보 보호, 서비스 관리, 보안정책 등의 선결되어야 하는 보안 기술이 많이 뒤쳐져 있는 실정이다. 그러므로 클라우드 컴퓨팅의 연구현황과 보안위협 분석, 그에 따른 요구사항을 분석하고 이를 바탕으로 클라우드 컴퓨팅 서비스의 참조 모델을 제안한다. 또한 클라우드 컴퓨팅 서비스의 위협분석을 통해 사용자 편의성, 클라우드 간 (Inter Cloud) 확장성, 가상 자원 연동이 가능한 보안 프레임워크를 제안하고자 한다.