• Title/Summary/Keyword: 사용자플랫폼

Search Result 2,056, Processing Time 0.031 seconds

A Study on Main Features of SNS Affecting SNS User Acceptance Decision (SNS의 수용결정에 영향을 미치는 SNS의 주요 특성에 관한 연구)

  • Oh, Eun-Hae
    • Management & Information Systems Review
    • /
    • v.31 no.3
    • /
    • pp.47-73
    • /
    • 2012
  • SNS allowed users to serve not only as the content and message producer but as the consumer, with development into various types of SNS platforms. Instead of a traditional media structure of media-to-many and unspecified users, it also made it possible to achieve one-to-one or one-to-many interactions, regardless of time and space, through SNS platforms. Moreover, according to development of digital communication technology, IT, media contents and communication network have been mutually connected, though they were once separate. The changes in communication environments have caused rapid disorganization and reorganization in popular culture led by specific expert groups. Such trend has a greater influence on marketing strategies of enterprises. In other words, it will lead them to mostly introduce new information technologies, based on consumer market, and to strategically participate in SNS for promotion and marketing for their products and brands. Likewise, SNS has currently appeared as the main media affecting consumers' behaviors. In consideration of the importance of SNS features, which can stimulate responses of other users, analysis of main features affecting SNS user acceptance decision is required, as well as its utilization strategies. Accordingly, this study conducted division of SNS features into openness, quickness, interactiveness and economical efficiency to derive strategies for increasing the usage frequency of SNS and ultimately maximizing the expectation effect, in addition to an empirical analysis of effects of SNS features on usefulness, easiness and pleasure perceived in SNS, and SNS user intention.

  • PDF

An MDA-Based Adaptive Context-Aware Service Using PARLAY X in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서 PARLAY X를 이용하는 MDA기반의 적응성 있는 문맥인식 서비스)

  • Hong Sung June
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.457-464
    • /
    • 2005
  • This paper describes an Adaptive Context-aware Service (ACS) using Model Driven Architecture (MDA)-based Service Creation Environment (SCE) on PARLAY X based service delivery platform in ubiquitous computing environments. It can be expected that both the context-awareness and adaptation in ubiquitous computing environments will be deployed. But the existing context-aware middleware lacks in considering adaptation. Therefore, the object of this paper is to support the architecture and the Application Programming Interface (API) of the network service for both the context-awareness and adaptation in ubiquitous computing environment. ACS is to provide users with the adaptive network service to the changing context constraints as well as detecting the changing context. For instance, ACS can provide users with QoS in network according to the detected context, after detecting the context such as location and speed. The architecture of ACS is comprised of a Service Creation Environment (SCE), Adaptive Context Broker and PARLAY gateway. SCE is to use Context-based Constraint Language (CCL) for an expression of context-awareness and adaptation. Adaptive Context Broker is to make a role of the broker between SCE and PARLAY G/W. PARLAY G/W is to support API for PARLAY X-based service delivery platform.

A TransGate System for Convenient Wireless Internet Contents Generation (편리한 무선인터넷 컨텐츠 생성을 위한 TransGate 시스템)

  • Ryu Dong-Yeop;Han Seung-Hyun;Lim Young-Whan
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.37-52
    • /
    • 2006
  • A mobile device like ceil phone is the necessity of modern people, of ich con be easily connected to a wireless internet through such a mobile device. The demand for a wireless data communication is growing rapidly. However, agencies have not yet completed standardization of a markup language. Due to the development of the Mobile Device, agencies in this field have provided different data formats with each Mobile Device Platform. Traditionally, contents is hand-tailored to suit the target device. A key problem is that the characteristics and capabilities of the mobile device are too diverse to service the most suitable mobile contents. Because of these problems, the need for a re-usable document description language increases. In this paper, we defined Template file that is common data to service mobile devices. We proposed a method that could be an effective wireless web service though design and the implementation of the Call manager & the XSL Generator. In the methodology, when requesting a wireless internet service, a mobile device finds out markup language and a hardware specification of the mobile device through the Call Manager component supports. The XSL Generator component creates the XSL file dynamically that is the most suitable to a device. Finally, contents is serviced to each device by XSLT. It can generate a wireless page more easily by reusing the existing web contents through such course. Therefore, it can save the time and expense for generating a wireless page.

  • PDF

Digital Transformation Based on Chatbot in Legacy Environment (챗봇을 이용한 Legacy 환경의 Digital Transformation)

  • Jang, Jeong-ho;Kim, Jin-soo;Lee, Kang-Yoon
    • The Journal of Bigdata
    • /
    • v.3 no.2
    • /
    • pp.79-85
    • /
    • 2018
  • As the utilization of chatbots grows and the AI market grows, many companies are interested. And everybody is spurring growth by offering chatbot build services so that they can create chatbots. This makes chatbots easier to service on the messenger platform, which is changing the existing application market. In this paper, we present a methodology for designing and implementing existing DB-based applications as instant messenger platform-based applications, and summarize what to consider in actual implementation to provide an optimal system structure. According to this methodology, we design and implement a chatbot that serves as an teaching advisor who provides information to the students in the curriculum. The implemented application objectively visualizes the user's desired information from the user's point of view and delivers it through the interactive interface quickly and intuitively. By implementing these services and real service, it is predicted that DB-based information providing applications will be implemented as chatbots and will be changed to bi-directional communication through an interactive interface. it is predicted that DB-based information providing applications will be implemented as chatbots and will be changed to bi-directional communication through an interactive interface. Enterprise legacy application will take chatbot technology as one of important digital transformation initiative.

A Study on the remote acuisition of HejHome Air Cloud artifacts (스마트 홈 헤이 홈 Air의 클라우드 아티팩트 원격 수집 방안 연구)

  • Kim, Ju-eun;Seo, Seung-hee;Cha, Hae-seong;Kim, Yeok;Lee, Chang-hoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.69-78
    • /
    • 2022
  • As the use of Internet of Things (IoT) devices has expanded, digital forensics coverage of the National Police Agency has expanded to smart home areas. Accordingly, most of the existing studies conducted to acquire smart home platform data were mainly conducted to analyze local data of mobile devices and analyze network perspectives. However, meaningful data for evidence analysis is mainly stored on cloud storage on smart home platforms. Therefore, in this paper, we study how to acquire stored in the cloud in a Hey Home Air environment by extracting accessToken of user accounts through a cookie database of browsers such as Microsoft Edge, Google Chrome, Mozilia Firefox, and Opera, which are recorded on a PC when users use the Hey Home app-based "Hey Home Square" service. In this paper, the it was configured with smart temperature and humidity sensors, smart door sensors, and smart motion sensors, and artifacts such as temperature and humidity data by date and place, device list used, and motion detection records were collected. Information such as temperature and humidity at the time of the incident can be seen from the results of the artifact analysis and can be used in the forensic investigation process. In addition, the cloud data acquisition method using OpenAPI proposed in this paper excludes the possibility of modulation during the data collection process and uses the API method, so it follows the principle of integrity and reproducibility, which are the principles of digital forensics.

A study of the impact of Metaverse attributes on intention to use - based on the Extended Technology Acceptance Model (메타버스특성이 이용의도에 미치는 영향에 관한 연구 - 확장된 기술수용모델을 기반으로)

  • Seung Beom Kim;Hyoung-Yong Lee
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.149-170
    • /
    • 2023
  • This study analyzed the factors influencing users' intention to use the Metaverse by applying the extended technology acceptance model. In other words, the factors affecting users' intention to use the Metaverse were defined as technical characteristics (telepresence, interoperability, seamlessness, concurrence, and economy flow) and personal characteristics (social influence and perceived enjoyment) from the perspective of the Extended Technology Acceptance Model. For this purpose, a survey was conducted among men and women of various ages ranging from teenagers to 60s, and the data collected from 327 participants were analyzed using SPSS 22.0 and Smart PLS 4.0. The results showed that perceived usefulness and perceived ease of use, which are antecedents of the Extended Technology Acceptance Model, influence the intention to use Metaverse, and perceived ease of use influences perceived usefulness. Telepresence, interoperability and economy flow were found to have a positive effect on perceived usefulness, and interoperability, seamlessness and concurrence were found to have a positive effect on perceived ease of use. In addition, social influence and perceived enjoyment had a positive effect on intention to use the Metaverse. This study is significant in that it empirically analyzed the factors of users' acceptance of the Metaverse, which is attracting attention as a new platform that will bring significant changes to our daily lives and platform consumption environments.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

Incorporating Social Relationship discovered from User's Behavior into Collaborative Filtering (사용자 행동 기반의 사회적 관계를 결합한 사용자 협업적 여과 방법)

  • Thay, Setha;Ha, Inay;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.1-20
    • /
    • 2013
  • Nowadays, social network is a huge communication platform for providing people to connect with one another and to bring users together to share common interests, experiences, and their daily activities. Users spend hours per day in maintaining personal information and interacting with other people via posting, commenting, messaging, games, social events, and applications. Due to the growth of user's distributed information in social network, there is a great potential to utilize the social data to enhance the quality of recommender system. There are some researches focusing on social network analysis that investigate how social network can be used in recommendation domain. Among these researches, we are interested in taking advantages of the interaction between a user and others in social network that can be determined and known as social relationship. Furthermore, mostly user's decisions before purchasing some products depend on suggestion of people who have either the same preferences or closer relationship. For this reason, we believe that user's relationship in social network can provide an effective way to increase the quality in prediction user's interests of recommender system. Therefore, social relationship between users encountered from social network is a common factor to improve the way of predicting user's preferences in the conventional approach. Recommender system is dramatically increasing in popularity and currently being used by many e-commerce sites such as Amazon.com, Last.fm, eBay.com, etc. Collaborative filtering (CF) method is one of the essential and powerful techniques in recommender system for suggesting the appropriate items to user by learning user's preferences. CF method focuses on user data and generates automatic prediction about user's interests by gathering information from users who share similar background and preferences. Specifically, the intension of CF method is to find users who have similar preferences and to suggest target user items that were mostly preferred by those nearest neighbor users. There are two basic units that need to be considered by CF method, the user and the item. Each user needs to provide his rating value on items i.e. movies, products, books, etc to indicate their interests on those items. In addition, CF uses the user-rating matrix to find a group of users who have similar rating with target user. Then, it predicts unknown rating value for items that target user has not rated. Currently, CF has been successfully implemented in both information filtering and e-commerce applications. However, it remains some important challenges such as cold start, data sparsity, and scalability reflected on quality and accuracy of prediction. In order to overcome these challenges, many researchers have proposed various kinds of CF method such as hybrid CF, trust-based CF, social network-based CF, etc. In the purpose of improving the recommendation performance and prediction accuracy of standard CF, in this paper we propose a method which integrates traditional CF technique with social relationship between users discovered from user's behavior in social network i.e. Facebook. We identify user's relationship from behavior of user such as posts and comments interacted with friends in Facebook. We believe that social relationship implicitly inferred from user's behavior can be likely applied to compensate the limitation of conventional approach. Therefore, we extract posts and comments of each user by using Facebook Graph API and calculate feature score among each term to obtain feature vector for computing similarity of user. Then, we combine the result with similarity value computed using traditional CF technique. Finally, our system provides a list of recommended items according to neighbor users who have the biggest total similarity value to the target user. In order to verify and evaluate our proposed method we have performed an experiment on data collected from our Movies Rating System. Prediction accuracy evaluation is conducted to demonstrate how much our algorithm gives the correctness of recommendation to user in terms of MAE. Then, the evaluation of performance is made to show the effectiveness of our method in terms of precision, recall, and F1-measure. Evaluation on coverage is also included in our experiment to see the ability of generating recommendation. The experimental results show that our proposed method outperform and more accurate in suggesting items to users with better performance. The effectiveness of user's behavior in social network particularly shows the significant improvement by up to 6% on recommendation accuracy. Moreover, experiment of recommendation performance shows that incorporating social relationship observed from user's behavior into CF is beneficial and useful to generate recommendation with 7% improvement of performance compared with benchmark methods. Finally, we confirm that interaction between users in social network is able to enhance the accuracy and give better recommendation in conventional approach.

A Reference Architecture and Manifest Standard Suggestions for Interworking Open Web Store (OWS(Open Web Store) 연동을 위한 참조 모델 및 Manifest 표준 제안)

  • Ryu, Taejun;Kim, Changjun;Jeon, Jonghong;Lee, Seungyoon;Park, Sangwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.11
    • /
    • pp.779-788
    • /
    • 2013
  • With a wide dissemination of smartphones, the number of native applications developed and sold freely by anyone is growing now. The application market activated by Apple's App Store is spreading more rapidly with Google's Google Play. But due to platform-dependent of native application's attribute, developers are programming at each platform. As a result, development cost is increasing compared to earnings. To solve a dependency problem, people focused on web application developed by web-based language. However, stores at each browser are requiring a web application to follow manifest format. And this causes browser-dependent problem. Those problems can be solved by installing a certain browser, but this can make an application useless on the other browser of a store. Dependency problem can narrow not only user's application variation, but also concentration on some specific store. OWS(Open Web Store) is a standard store that supports various web environments. It overcomes browser or platform dependency problems by interworking applications between stores. Also customers are able to choose a large number of applications. In this paper, related to OWS, I would like to suggest manifest standards and store's reference architecture. An interworking scenario is going to be proposed as well.

Verification and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경에서 서비스 번들 인증 메커니즘의 검증 및 구현)

  • 김영갑;문창주;박대하;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.27-40
    • /
    • 2004
  • The OSGi service platform has several characteristics as in the followings. First, the service is deployed in the form of self-installable component called service bundle. Second, the service is dynamic according to its life-cycle and has interactions with other services. Third, the system resources of a home gateway are restricted. Due to these characteristics of a home gateway, there are a lot of rooms for malicious services can be Installed, and further, the nature of service can be changed. It is possible for those service bundles to influence badly on service gateways and users. However, there is no service bundle authentication mechanism considering those characteristics for the home gateway In this paper, we propose a service bundle authentication mechanism considering those characteristics for the home gateway environment. We design the mechanism for sharing a key which transports a service bundle safely in bootstrapping step that recognize and initialize equipments. And we propose the service bundle authentication mechanism based on MAC that use a shared secret created in bootstrapping step. Also we verify the safety of key sharing mechanism and service bundle authentication mechanism using a BAN Logic. This service bundle authentication mechanism Is more efficient than PKI-based service bundle authentication mechanism or RSH protocol in the service platform which has restricted resources such as storage spaces and operations.