• Title/Summary/Keyword: 사용자인지도

Search Result 35,968, Processing Time 0.059 seconds

The Effects of Metaphors in the Interface of Smartphone Applications on Users' Intention to Use (사용자환경의 메타포가 스마트폰 애플리케이션 사용의도에 미치는 영향)

  • Jung, Wonjin;Hong, Suk-Ki
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.255-279
    • /
    • 2014
  • It is not too much to say that smartphones have become an essential part of our lives due to their versatility. Nevertheless, they still have less overall capabilities than their desktop counterparts. Specifically, they have small screens and low resolutions, which make their applications difficult to have a usable interface. To account for these limitations, the interface of smartphone applications should be designed carefully and properly. Good interface design to any application is critical. However, a comprehensive information systems (IS) literature review found that there has been little research on the user interface design of smartphone applications. More specifically, there has been little empirical evidence and understanding about how metaphors, an imaginative way of describing objects and concepts, in the user interface of smartphone applications affect users' intention to use the applications. Thereby, the research goals of this study are to examine 1) the effects of the metaphors in the user interface of smartphone applications on the interaction between users and applications and 2) the effects of mediating variables including the interaction between users and applications, users' beliefs and attitudes, on users' intention to use the applications. A survey was conducted to collect data. University students and practitioners participated in the survey. A 24-item questionnaire was developed on a 5-point Likert-type scale. The measurement items were mostly adapted from the previous studies in the IS literature and modified to fit the context of this study. First, a principal component factor analysis was performed to explore the inter-relationships among a set of variables. The analysis showed that most of the items loaded quite strongly on the six components. The analysis also revealed the six components with eigenvalues exceeding 1, explaining a total of 70.7 per cent of the variance. The reliabilities of the items were also checked. Most Cronbach alpha values were above 0.8, so the scales were considered reliable. In sum, the results of the analysis support the decision to retain the six factors for further investigation. Next, the structural model was analyzed with AMOS structural equation modeling. The values of GFI, AGFI, NFI, TLI, CFI, and RMSEA were checked. The values showed that the research model considerably have a good fit in general. Next, the convergent and discriminant validities of all constructs were examined. The values for the standardized regression weights and critical ration (CR) indicated sufficient convergent validity for all constructs. In addition, the square root of the average variance extracted (AVE) of each construct was compared with its correlations with all other constructs. The results supported discriminant validity for all constructs. In sum, the results of analysis demonstrated adequate convergent and discriminant validities for all constructs. Finally, path coefficients between the variables were examined. Methphor was found to have an impact on interaction (${\beta}$ = .457, p = .000). There were also significant effects of the interaction on perceived usefulness (${\beta}$ = .273, p = .000) and ease of use (${\beta}$ = .405, p = .000). User attitude was significantly influenced by these two beliefs, perceived usefulness (${\beta}$ = .386, p = .000) and ease of use (${\beta}$ = .347, p = .000) respectively. Further, the results of analysis found that users' intention to use smartphone applications was significantly influenced by user attitude (${\beta}$ = .567, p = .000). Based upon the analyses, all hypotheses were supported. This study found that the metaphors used in the interface of smartphone applications affect not only the interaction between users and applications, but also users' intention to use the applications through the mediating variables, perceived usefulness and ease of use. These findings imply that if the metaphors used in the user interface of application are easy enough to understand for smartphone users, then the application can be perceived useful and easy to use, which in turn make users to have an intention to use the application. In conclusion, this study contributed not only to validate and extend Technology Acceptance Model (TAM) partially, but also to develop the construct of metaphor in smartphone settings. However, since a single empirical study cannot be enough to validate the findings, some limitations should be considered.

A Study on the Effect of Location-based Service Users' Perceived Value and Risk on their Intention for Security Enhancement and Continuous Use: With an Emphasis on Perceived Benefits and Risks (위치기반서비스 사용자의 지각된 가치와 위험이 보안강화의도와 지속이용의도에 미치는 영향에 관한 연구: 지각된 혜택과 위험을 중심으로)

  • Park, Kyung Ah;Lee, Dae Yong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.299-323
    • /
    • 2014
  • The reason location based service is drawing attention recently is because smart phones are being supplied increasingly. Smart phone, basically equipped with GPS that can identify location information, has the advantage that it can provide contents and services suitable for the user by identifying user location accurately. Offering such diverse advantages, location based services are increasingly used. In addition, for use of location based services, release of user's personal information and location data is essentially required. Regarding personal information and location data, in addition to IT companies, general companies also are conducting various profitable businesses and sales activities based on personal information, and in particular, personal location data, comprehending high value of use among personal information, are drawing high attentions. Increase in demand of personal information is raising the risk of personal information infringement, and infringements of personal location data also are increasing in frequency and degree. Therefore, infringements of personal information should be minimized through user's action and efforts to reinforce security along with Act on the Protection of Personal Information and Act on the Protection of Location Information. This study aimed to improve the importance of personal information privacy by empirically analyzing the effect of perceived values on the intention to strengthen location information security and continuously use location information for users who received location-based services (LBS) in mobile environments with the privacy calculation model of benefits and risks as a theoretical background. This study regarded situation-based provision, the benefit which users perceived while using location-based services, and the risk related to personal location information, a risk which occurs while using services, as independent variables and investigated the perceived values of the two variables. It also examined whether there were efforts to reduce risks related to personal location information according to the values of location- based services, which consumers perceived through the intention to strengthen security. Furthermore, it presented a study model which intended to investigate the effect of perceived values and intention of strengthening security on the continuous use of location-based services. A survey was conducted for three hundred ten users who had received location-based services via their smartphones to verify study hypotheses. Three hundred four questionnaires except problematic ones were collected. The hypotheses were verified, using a statistical method and a logical basis was presented. An empirical analysis was made on the data collected through the survey with SPSS 12.0 and SmartPLS 2.0 to verify respondents' demographic characteristics, an exploratory factor analysis and the appropriateness of the study model. As a result, it was shown that the users who had received location-based services were significantly influenced by the perceived value of their benefits, but risk related to location information did not have an effect on consumers' perceived values. Even though users perceived the risk related to personal location information while using services, it was viewed that users' perceived value had nothing to do with the use of location-based services. However, it was shown that users significantly responded to the intention of strengthening security in relation to location information risks and tended to use services continuously, strengthening positive efforts for security when their perceived values were high.

Reading Deviations of Glass Rod Dosimeters Using Different Pre-processing Methods for Radiotherapeutic in-vivo Dosimetry (유리선량계의 전처리 방법이 방사선 치료 선량 측정에 미치는 영향)

  • Jeon, Hosang;Nam, Jiho;Park, Dahl;Kim, Yong Ho;Kim, Wontaek;Kim, Dongwon;Ki, Yongkan;Kim, Donghyun;Lee, Ju Hye
    • Progress in Medical Physics
    • /
    • v.24 no.2
    • /
    • pp.92-98
    • /
    • 2013
  • The experimental verification of treatment planning on the treatment spot is the ultimate method to assure quality of radiotherapy, so in-vivo skin dose measurement is the essential procedure to confirm treatment dose. In this study, glass rod dosimeter (GRD), which is a kind of photo-luminescent based dosimeters, was studied to produce a guideline to use GRDs in vivo dosimetry for quality assurance of radiotherapy. The pre-processing procedure is essential to use GRDs. This is a heating operation for stabilization. Two kinds of pre-processing methods are recommended by manufacturer: a heating method (70 degree, 30 minutes) and a waiting method (room temperature, 24 hours). We equally irradiated 1.0 Gy to 20 GRD elements, and then different preprocessing were performed to 10 GRDs each. In heating method, reading deviation of GRDs at same time were relatively high, but the deviation was very low as time went on. In waiting method, the deviation among GRDs was low, but the deviation was relatively high as time went on. The meaningful difference was found between mean reading values of two pre-processing methods. Both methods present mean dose deviation under 5%, but the relatively high effect by reading time was observed in waiting method. Finally, GRD is best to perform in-vivo dosimetry in the viewpoint of accuracy and efficiency, and the understanding of how pre-processing affect the accuracy is asked to perform most accurate in-vivo dosimetry. The further study is asked to acquire more stable accuracy in spite of different irradiation conditions for GRD usage.

Development of Video Image-Guided Setup (VIGS) System for Tomotherapy: Preliminary Study (단층치료용 비디오 영상기반 셋업 장치의 개발: 예비연구)

  • Kim, Jin Sung;Ju, Sang Gyu;Hong, Chae Seon;Jeong, Jaewon;Son, Kihong;Shin, Jung Suk;Shin, Eunheak;Ahn, Sung Hwan;Han, Youngyih;Choi, Doo Ho
    • Progress in Medical Physics
    • /
    • v.24 no.2
    • /
    • pp.85-91
    • /
    • 2013
  • At present, megavoltage computed tomography (MVCT) is the only method used to correct the position of tomotherapy patients. MVCT produces extra radiation, in addition to the radiation used for treatment, and repositioning also takes up much of the total treatment time. To address these issues, we suggest the use of a video image-guided setup (VIGS) system for correcting the position of tomotherapy patients. We developed an in-house program to correct the exact position of patients using two orthogonal images obtained from two video cameras installed at $90^{\circ}$ and fastened inside the tomotherapy gantry. The system is programmed to make automatic registration possible with the use of edge detection of the user-defined region of interest (ROI). A head-and-neck patient is then simulated using a humanoid phantom. After taking the computed tomography (CT) image, tomotherapy planning is performed. To mimic a clinical treatment course, we used an immobilization device to position the phantom on the tomotherapy couch and, using MVCT, corrected its position to match the one captured when the treatment was planned. Video images of the corrected position were used as reference images for the VIGS system. First, the position was repeatedly corrected 10 times using MVCT, and based on the saved reference video image, the patient position was then corrected 10 times using the VIGS method. Thereafter, the results of the two correction methods were compared. The results demonstrated that patient positioning using a video-imaging method ($41.7{\pm}11.2$ seconds) significantly reduces the overall time of the MVCT method ($420{\pm}6$ seconds) (p<0.05). However, there was no meaningful difference in accuracy between the two methods (x=0.11 mm, y=0.27 mm, z=0.58 mm, p>0.05). Because VIGS provides a more accurate result and reduces the required time, compared with the MVCT method, it is expected to manage the overall tomotherapy treatment process more efficiently.

A Study on EC Acceptance of Virtual Community Users (가상 공동체 사용자의 전자상거래 수용에 대한 연구)

  • Lee, Hyoung-Yong;Ahn, Hyun-Chul
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.147-165
    • /
    • 2009
  • Virtual community(VC) will increasingly be organized as commercial enterprises, with the objective of earning an attractive financial return by providing members with valuable resources and environment. For example, Cyworld.com in Korea uses several community services to enable customers of Cyworld to take control of their own value as potential purchasers of products and services. Although initial adoption is important for online network service success, it does not necessarily result in the desired managerial performance unless the initial usage is continuously related to the continuous usage and purchase. Particularly, the customer who receives relevant online services and is well equipped with online network services, will trust the online service provider and perceive less risk and experience more activities such as continuous usage and purchase. Thus, how to promote continued online service usage or, alternatively, how to prevent discontinuance is a critical issue for VC service providers to consider. By aggregating a wide range of information and online environments for customers and providing trust to its members, the service providers of virtual communities help to reduce the perceived risk of continuous usage and purchase. Drill down, online service managers realize that achieving strong and sustained customers who continuously use online service and purchase on it is crucial. Therefore, the research into this online service continuance will identify the relationship between the initial usage and the continuous usage and purchase. The research of continuous usage or post adoption has recently emerged as an important issue in the IS literature. Individuals' information systems(IS) continuous usage decisions are congruent with consumers' repeat purchase decisions. The TAM(Technology Acceptance Model) paradigm has been strongly confirmed across a wide range from product purchase on EC to online service usage contexts. The analysis of IS usage based on TAM has proven to be successful across almost online service contexts. However, most of previous studies have focused on only an area (i.e., VC or EC). Just little research has tried to analyze the relationship between VC and EC. The effect of some factors on user intention, captured through several theories such as TAM, has been demonstrated. Yet, few studies have explored the salient relationships of VC users' EC acceptance. To fill this gap between VC and EC research, this paper attempts to develop a research model that extends the TAM perspective in view of the additional contributions of trust in the service provider and trust in members on some factors that affect EC and VC adoption. In this extension, we applied the TAM-to-TAM(T2T) model, and analyzed the transfer effect of trust between these two TAMs. The research model was empirically tested on the context of a social network service. The model was to extend TAM with the trust concept for the virtual community environment from the perspective of tasks. By building an extended model of TAM and examining the relationships between trust and the existing variables of TAM, it is aimed to explain a user's continuous intention to use VC and purchase on EC. The unit of analysis in this paper is an individual user of a virtual community. The population of interest is the individual with the experiences in virtual community. The data for this paper was made available via a Web survey of VC users. In total, 281 cases were gathered for about one week, but there were some missing values in the sample and there were some inappropriate cases. Thus, only 248 cases were finally analyzed. We chose the structural equation analysis to test the hypotheses and it is better suited for explaining complex relationships than the other methods. In this test, AMOS was used to test the Structural Equation Model (SEM). Noticeable results have been found in the T2T model regarding the factors affecting the intention to use of virtual community and loyalty. Our result showed that trust transfer plays a key role in forming the two adoption beliefs. Overall, this study preliminarily confirms the salience of trust transfer in online service.

A Study on Establishment of Safety Training Center Based on Virtual Reality and Augmented Reality Technology for Military Safety and Suicide Accident Prevention (가상현실(VR/AR) 기술 기반으로 군 안전 및 자살사고 예방을 위한 안전체험훈련장 구축 방안에 관한 연구)

  • Choi, Sung-oh;Min, Yong-sik;Kim, Sung-Il;Ghoi, Jong-geun
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.139-148
    • /
    • 2020
  • Due to change in circumstances in the 2000s such as severe birthrate decline and shortened military service period, the armed forces of the Republic of Korea is currently turning to technologies and equipments from manpower, developing it to become high-tech, high-speed, and complex, resulting in an environment in which a single mistake could cause a mass mortality crisis.It is also evident that, considering aspects such as safety training curriculums and achievements of advanced countries and private education, hands-on training is a must in preventing suicides and accidents in the military, and establishing safety training centers is crucial for systematic and effective hands-on training.Soldiers who are joining the army as of now have experienced the Internet ever since they were born and easily use both virtual and augmented reality, and the current level of science and technology has developed to the point where most of the public safety experience centers are able to be replaced by virtual and augmented reality (VR/AR). Therefore, considering the aspects such as installation space, construction costs, maintenance costs, user characteristics, and education effects, other than for those trainings where real models and objects are more effective such as first aid training, it is with a strong recommendation that establishing military safety training facilities with VR/AR (Virtual and augmented reality) is a must in the coming future. We have derived the need for hands-on training by considering the development of virtual and augmented reality (VR/AR), analysis of operation status of the public safety experience centers, characteristics of military units, installation and maintenance costs, and proposed plan to establish safety training centers where effective training performance can be achieved at a lower cost than the public safety experience center. In addition, we suggested the scale of the required safety training center and the composition of the experience rooms considering the number of trainees and the environment of each military units. Given this analysis it will contribute to the prevention of military safety and suicide by building a safety training center in the future.

Novel LTE based Channel Estimation Scheme for V2V Environment (LTE 기반 V2V 환경에서 새로운 채널 추정 기법)

  • Chu, Myeonghun;Moon, Sangmi;Kwon, Soonho;Lee, Jihye;Bae, Sara;Kim, Hanjong;Kim, Cheolsung;Kim, Daejin;Hwang, Intae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.3
    • /
    • pp.3-9
    • /
    • 2017
  • Recently, in 3rd Generation Partnership Project(3GPP), there is a study of the Long Term Evolution(LTE) based vehicle communication which has been actively conducted to provide a transport efficiency, telematics and infortainment. Because the vehicle communication is closely related to the safety, it requires a reliable communication. Because vehicle speed is very fast, unlike the movement of the user, radio channel is rapidly changed and generate a number of problems such as transmission quality degradation. Therefore, we have to continuously updates the channel estimates. There are five types of conventional channel estimation scheme. Least Square(LS) is obtained by pilot symbol which is known to transmitter and receiver. Decision Directed Channel Estimation(DDCE) scheme uses the data signal for channel estimation. Constructed Data Pilot(CDP) scheme uses the correlation characteristic between adjacent two data symbols. Spectral Temporal Averaging(STA) scheme uses the frequency-time domain average of the channel. Smoothing scheme reduces the peak error value of data decision. In this paper, we propose the novel channel estimation scheme in LTE based Vehicle-to-Vehicle(V2V) environment. In our Hybrid Reliable Channel Estimation(HRCE) scheme, DDCE and Smoothing schemes are combined and finally the Linear Minimum Mean Square Error(LMMSE) scheme is applied to minimize the channel estimation error. Therefore it is possible to detect the reliable data. In simulation results, overall performance can be improved in terms of Normalized Mean Square Error(NMSE) and Bit Error Rate(BER).

Performance Analysis of Implementation on IoT based Smart Wearable Mine Detection Device

  • Kim, Chi-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.51-57
    • /
    • 2019
  • In this paper, we analyzed the performance of IoT based smart wearable mine detection device. There are various mine detection methods currently used by the military. Still, in the general field, mine detection is performed by visual detection, probe detection, detector detection, and other detection methods. The detection method by the detector is using a GPR sensor on the detector, which is possible to detect metals, but it is difficult to identify non-metals. It is hard to distinguish whether the area where the detection was performed or not. Also, there is a problem that a lot of human resources and time are wasted, and if the user does not move the sensor at a constant speed or moves too fast, it is difficult to detect landmines accurately. Therefore, we studied the smart wearable mine detection device composed of human body antenna, main microprocessor, smart glasses, body-mounted LCD monitor, wireless data transmission, belt type power supply, black box camera, which is to improve the problem of the error of mine detection using unidirectional ultrasonic sensing signal. Based on the results of this study, we will conduct an experiment to confirm the possibility of detecting underground mines based on the Internet of Things (IoT). This paper consists of an introduction, experimental environment composition, simulation analysis, and conclusion. Introduction introduces the research contents such as mines, mine detectors, and research progress. It consists of large anti-personnel mine, M16A1 fragmented anti-mine, M15 and M19 antitank mines, plastic bottles similar to mines and aluminum cans. Simulation analysis is conducted by using MATLAB to analyze the mine detection device implementation performance, generating and transmitting IoT signals, and analyzing each received signal to verify the detection performance of landmines. Then we will measure the performance through the simulation of IoT-based mine detection algorithm so that we will prove the possibility of IoT-based detection landmine.

The Study of Nano-vesicle Coated Powder (나노베시클 표면처리 분체의 개발연구)

  • Son, Hong-Ha;Kwak, Taek-Jong;Kim, Kyung-Seob;Lee, Sang-Min;Lee, Cheon-Koo
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.32 no.1 s.55
    • /
    • pp.45-51
    • /
    • 2006
  • In the field of makeup cosmetics, especially, powder-based foundations such as two-way cake, pact and face powder, the quality of which is known to be strongly influenced by the properties of powder, surface treatment technology is widely used as a method to improve the various characteristics of powder texture, wear properties, dispersion ability and so on. The two-way cake or pressed-powder foundation is one of the familiar makeup products in Asian market for deep covering and finishing purpose. In spite of the relent progress in surface modification method such as composition of powders with different characteristics and application of a diversity of coating ingredient (metal soap, amino acid, silicone and fluorine), this product possess a technical difficulty to enhance both of the adhesion power and spreadability on the skin in addition to potential claim of consumer about heavy or thick feeling. This article is covering the preparation and coating method of nano-vesicle that mimic the double-layered lipid lamellar structure existing between the corneocytes of the stratum corneum in the skin for the purpose of improving both of two important physical characteristic of two-way cake, spreadability and adhering force to skin, and obtining better affinity to skin. Nano-vesicle was prepared using the high-pressure emulsifying process of lecithin, pseudo ceramide, butylene glycol and tocopheryl acetate. This nano-sized emulsion was added to powder-dispersed aqueous phase together with bivalent metal salt solution and then the filtering and drying procedure was followed to yield the nano-vesicle coated powder. The amount of nano-vesicle coated on the powder was able to regulated by the concentration of metal salt and this novel powder showed the lower friction coefficient, more uniform condition of application and higher adhesive powder comparing with the alkyl silane treated powder from the test result of spreadability and wear properties using friction meter and air jet method. Two-wav cake containing newly developed coated powder with nano-vesicle showed the similar advantages in the frictional and adhesive characteristics.

The Extended Site Assessment Procedure Based on Knowledge of Biodegradability to Evaluate the Applicability of Intrinsic Remediation (자연내재복원기술(Intrinsic Remediation)적용을 위한 오염지역 평가과정 개발)

  • ;Robert M. Cowan
    • Journal of Korea Soil Environment Society
    • /
    • v.2 no.3
    • /
    • pp.3-21
    • /
    • 1997
  • The remediation of contamiated sites using currently available remediation technologies requires long term treatment and huge costs, and it is uncertain to achieve the remediation goal to drop contamination level to either back-ground or health-based standards by using such technologies. Intrinsic remediation technology is the remediation technology that relies on the mechanisms of natural attenuation for the containment and elimination of contaminants in subsurface environments. Initial costs for the intrinsic remediation may be higher than conventional treatment technologies because the most comprehensive site assessment for intrinsic remediation is required. Total remediation cost, however may be the lowest among the presently employed technologies. The applicability of intrinsic remediation in the contaminated sites should be theroughly investigated to achieve the remedial goal of the technology. This paper provides the frame of the extended site assessment procedure based on knowledge of biodegradability to evaluate the applicability of intrinsic remediation. This site assessment procedure is composed of 5 steps such as preliminary site screening, assessment of the current knowledge of biodegradability, selecting the appropriate approach, analyzing the contaminant fate and transport and planning the monitoring schedule. In the step 1, followings are to be decided 1) whether to go on the the detailed assessment or not based on the rules of thumb concerning the biodegradability of organic compounds, 2) which protocol document is selected to follow for detailed site assessment according to the site characteristics, contaminants and the relative distance between the contamination and potential receptors. In the step 2, the database for biodegradability are searched and evaluated. In the step 3, the appropriate biodegradability pathways for the contaminated site is selected. In the step 4, the fate and transport of the contaminants at the site are analyzed through modeling. In the step 5, the monitoring schedule is planned according to the result of the modeling. Through this procedure, users may able to have the rational and systematic informations for the application of intrinsic remediation. Also the collected data and informations can be used as the basic to re-select the other remediation technology if it reaches a conclusion not to applicate intrinsic remediation technology at the site from the site assessment procedure.

  • PDF