• Title/Summary/Keyword: 사용자 유형

Search Result 1,143, Processing Time 0.044 seconds

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

A Study on Consumer Characteristics According to Social Media Use Clusters When Purchasing Agri-food Online (온라인 농식품 구매시 소셜미디어 이용 군집에 따른 소비자특성에 대한 연구)

  • Lee, Myoung-Kwan;Park, Sang-Hyeok;Kim, Yeon-Jong
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.4
    • /
    • pp.195-209
    • /
    • 2021
  • According to the 2019-2020 social media usage survey conducted by the Seoul e-commerce center, 5 out of 10 consumers have experienced shopping through social media. The cost of traditional advertising media has been reduced and advertising spending on social media has risen by 74%, indicating that social media is becoming a more important marketing element. While the number of users of social media has increased and corporate marketing activities have increased accordingly, research has been conducted in various aspects of marketing such as user motivation for social media, satisfaction, and purchase intention. There was no subdivided study on the differences in the social media usage frequency of consumers in actual purchasing behavior. This study attempted to identify differences in consumer characteristics by cluster in the agrifood purchase situation by grouping them by type according to the frequency of use of social media for consumers who purchase agri-food online. Product involvement, product need, and online purchase channel Consumer characteristics such as demographic distribution, perceived risk, and eating and lifestyle in each cluster were checked for the three agrifood purchase situations including choice, and types for each cluster were presented. To this end, questionnaire data on the frequency of social media use and online agrifood purchase behavior were collected from 245 consumers, and the validity of the measurement variables was secured through factor analysis and reliability analysis. As a result of cluster analysis according to the frequency of social media use, it was divided into three clusters. The first cluster was a group that mainly used open social media, and the second cluster was a group that used both open and closed social media and online shopping malls; The third cluster was a group with low online media usage overall, and the characteristics of each cluster appeared. Through regression analysis, the effect on product involvement, product need, and purchase channel selection when purchasing agri-food online through each of the three clusters was confirmed through regression analysis. As a result of the regression analysis, the characteristic of cluster 1 in the situation of purchasing agri-food online is a male in his 30s living in a rural area who has no reluctance to purchase agri-food on social media or online shopping malls. The characteristics of cluster 2 are mainly consumers who are interested in purchasing health food, and the consumer characteristics are represented. In the case of cluster 3, when purchasing products online, they purchase after considering quality and price a lot, and the consumer characteristics are represented as people who are more confident in purchasing offline than online. Through this study, it is judged that by identifying the differences in consumer characteristics that appear in the agri-food purchase situation according to the frequency of social media use, it can be helpful in strategic judgments in marketing practice on social media customer targeting and customer segmentation.

An Analysis for Deriving New Convergent Service of Mobile Learning: The Case of Social Network Analysis and Association Rule (모바일 러닝에서의 신규 융합서비스 도출을 위한 분석: 사회연결망 분석과 연관성 분석 사례)

  • Baek, Heon;Kim, Jin Hwa;Kim, Yong Jin
    • Information Systems Review
    • /
    • v.15 no.3
    • /
    • pp.1-37
    • /
    • 2013
  • This study is conducted to explore the possibility of service convergence to promote mobile learning. This study has attempted to identify how mobile learning service is provided, which services among them are considered most popular, and which services are highly demanded by users. This study has also investigated the potential opportunities for service convergence of mobile service and e-learning. This research is then extended to examine the possibility of active convergence of common services in mobile services and e-learning. Important variables have been identified from related web pages of portal sites using social network analysis (SNA) and association rules. Due to the differences in number and type of variables on different web pages, SNA was used to deal with the difficulties of identifying the degree of complex connection. Association analysis has been used to identify association rules among variables. The study has revealed that most frequent services among common services of mobile services and e-learning were Games and SNS followed by Payment, Advertising, Mail, Event, Animation, Cloud, e-Book, Augmented Reality and Jobs. This study has also found that Search, News, GPS in mobile services were turned out to be very highly demanded while Simulation, Culture, Public Education were highly demanded in e-learning. In addition, It has been found that variables involving with high service convergence based on common variables of mobile and e-learning services were Games and SNS, Games and Sports, SNS and Advertising, Games and Event, SNS and e-Book, Games and Community in mobile services while Games, Animation, Counseling, e-Book, being preceding services Simulation, Speaking, Public Education, Attendance Management were turned out be highly convergent in e-learning services. Finally, this study has attempted to predict possibility of active service convergence focusing on Games, SNS, e-Book which were highly demanded common services in mobile and e-learning services. It is expected that this study can be used to suggest a strategic direction to promote mobile learning by converging mobile services and e-learning.

  • PDF

An Implementation of Dynamic Gesture Recognizer Based on WPS and Data Glove (WPS와 장갑 장치 기반의 동적 제스처 인식기의 구현)

  • Kim, Jung-Hyun;Roh, Yong-Wan;Hong, Kwang-Seok
    • The KIPS Transactions:PartB
    • /
    • v.13B no.5 s.108
    • /
    • pp.561-568
    • /
    • 2006
  • WPS(Wearable Personal Station) for next generation PC can define as a core terminal of 'Ubiquitous Computing' that include information processing and network function and overcome spatial limitation in acquisition of new information. As a way to acquire significant dynamic gesture data of user from haptic devices, traditional gesture recognizer based on desktop-PC using wire communication module has several restrictions such as conditionality on space, complexity between transmission mediums(cable elements), limitation of motion and incommodiousness on use. Accordingly, in this paper, in order to overcome these problems, we implement hand gesture recognition system using fuzzy algorithm and neural network for Post PC(the embedded-ubiquitous environment using blue-tooth module and WPS). Also, we propose most efficient and reasonable hand gesture recognition interface for Post PC through evaluation and analysis of performance about each gesture recognition system. The proposed gesture recognition system consists of three modules: 1) gesture input module that processes motion of dynamic hand to input data 2) Relational Database Management System(hereafter, RDBMS) module to segment significant gestures from input data and 3) 2 each different recognition modulo: fuzzy max-min and neural network recognition module to recognize significant gesture of continuous / dynamic gestures. Experimental result shows the average recognition rate of 98.8% in fuzzy min-nin module and 96.7% in neural network recognition module about significantly dynamic gestures.

A Comparative Study on the Design Element in Traditional Palaces Korea, China and Japan (한 중 일 의장 문화 비교 연구 - 궁궐전출을 중심으로 -)

  • Lee, Hyun-Jung;Park, Young-Soon;Choi, Ji-Young;Hwang, Jung-Ah
    • Archives of design research
    • /
    • v.18 no.4 s.62
    • /
    • pp.277-286
    • /
    • 2005
  • The purpose of this study is to ascertain the design element in traditional palaces of Korea, China and Japan. It takes threesteps to proceed this study. Firstly, it needs to be established the analysis framework from the documents. In second step, the design elements - the form, the material, the pattern and the color - should be collected and investigated through the observation of the actual traditional palaces the Changduckung, the Forbidden City, the Nijo castle. The third step is the analysis of the results of the investigation of the design elements from step two. To sum up similarities and dissimilarities among the design element in traditional palaces of Korea, China and Japan is as the following It is to be noticed that the mainly common characteristics of the artistic design are 'naturalism', 'harmonious ideas' and 'confucianism'. But the representation style of the design element is differed from the country. : The typical features of China are symmetry, glassy surface by artificial process, the meandered curve, the magnificent pattern and the constrable color. In Japan, the mathematical asymmetry, made-up rough surface by artificial skill, decorativepattern with abbreviation and achromatic color are important feature of the design element. While the major features of Korean design element are asymmetrical balance with nature, rough surface by natural process, moderate pattern and harmonious color.

  • PDF

A Study on the Emotional Reaction to the Interior Design - Focusing on the Worship Space in the Church Buildings - (실내공간 구성요소에 의한 감성반응 연구 - 기독교 예배공간 강단부를 중심으로 -)

  • Lee, Hyun-Jeong;Lee, Gyoo-Baek
    • Archives of design research
    • /
    • v.18 no.4 s.62
    • /
    • pp.257-266
    • /
    • 2005
  • The purpose of this study is to investigate the psychological reaction to the image of the worship space in the church buildings and to quantify its contribution of the stimulation elements causing such reaction, and finally to suggest basic data for realizing emotional worship space of the church architecture. For this, 143 christians were surveyed to analyze the relationship between 23 emotional expressions extracted from the worship space and 32 images of the worship space. The combined data was described with the two dimensional dispersion using the quantification theory III. The analysis found out that 'simplicity-complexity' of the image consisted of the horizontal axis (the x-axis) and 'creativity' of the image the vertical axis(the y-axis). In addition, to extract the causal relationship between the value of emotional reaction and its stimulation elements quantitatively, the author indicated 4 emotional word groups such as simple, sublime for x-axis and typical creative for y-axis based on its similarity by the cluster analysis, The quantification theory I was also used with total value of equivalent emotional words as the standard variance and the emotional stimulation elements of the worship space as the independent variance. 9 specific examples of the emotional stimulation elements were selected including colors and shapes of the wall and the ceiling, shapes and finish of the floor materials, window shapes, and the use of the symbolic elements. Furthermore, 31 subcategories were also chosen to analyse their contribution on the emotional reaction. As a result, the color and finish of the wall found to be the most effective element on the subjects' emotional reaction, while the symbolic elements and the color of the wall found to be the least effective. It is estimated that the present study would be helpful to increase the emotional satisfaction of the users and to approach a spatial design through satisfying the types and purposes of the space.

  • PDF

The Effects of Customer Product Review on Social Presence in Personalized Recommender Systems (개인화 추천시스템에서 고객 제품 리뷰가 사회적 실재감에 미치는 영향)

  • Choi, Jae-Won;Lee, Hong-Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.3
    • /
    • pp.115-130
    • /
    • 2011
  • Many online stores bring features that can build trust in their customers. More so, the number of products or content services on online stores has been increasing rapidly. Hence, personalization on online stores is considered to be an important technology to companies and customers. Recommender systems that provide favorable products and customer product reviews to users are the most commonly used features in this purpose. There are many studies to that investigated the relationship between social presence as an antecedent of trust and provision of recommender systems or customer product reviews. Many online stores have made efforts to increase perceived social presence of their customers through customer reviews, recommender systems, and analyzing associations among products. Primarily because social presence can increase customer trust or reuse intention for online stores. However, there were few studies that investigated the interactions between recommendation type, product type and provision of customer product reviews on social presence. Therefore, one of the purposes of this study is to identify the effects of personalized recommender systems and compare the role of customer reviews with product types. This study performed an experiment to see these interactions. Experimental web pages were developed with $2{\times}2$ factorial setting based on how to provide social presence to users with customer reviews and two product types such as hedonic and utilitarian. The hedonic type was a ringtone chosen from Nate.com while the utilitarian was a TOEIC study aid book selected from Yes24.com. To conduct the experiment, web based experiments were conducted for the participants who have been shopping on the online stores. Participants were a total of 240 and 30% of the participants had the chance of getting the presents. We found out that social presence increased for hedonic products when personalized recommendations were given compared to non.personalized recommendations. Although providing customer reviews for two product types did not significantly increase social presence, provision of customer product reviews for hedonic (ringtone) increased perceived social presence. Otherwise, provision of customer product reviews could not increase social presence when the systems recommend utilitarian products (TOEIC study.aid books). Therefore, it appears that the effects of increasing perceived social presence with customer reviews have a difference for product types. In short, the role of customer reviews could be different based on which product types were considered by customers when they are making a decision related to purchasing on the online stores. Additionally, there were no differences for increasing perceived social presence when providing customer reviews. Our participants might have focused on how recommendations had been provided and what products were recommended because our developed systems were providing recommendations after participants rating their preferences. Thus, the effects of customer reviews could appear more clearly if our participants had actual purchase opportunity for the recommendations. Personalized recommender systems can increase social presence of customers more than nonpersonalized recommender systems by using user preference. Online stores could find out how they can increase perceived social presence and satisfaction of their customers when customers want to find the proper products with recommender systems and customer reviews. In addition, the role of customer reviews of the personalized recommendations can be different based on types of the recommended products. Even if this study conducted two product types such as hedonic and utilitarian, the results revealed that customer reviews for hedonic increased social presence of customers more than customer reviews for utilitarian. Thus, online stores need to consider the role of providing customer reviews with highly personalized information based on their product types when they develop the personalized recommender systems.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Foundational Research on the Market Strategies and Current Status of Children's Indoor Theme Parks with Korean Characters as Their Theme (국산 캐릭터를 테마로 한 어린이 실내 테마파크의 현황 및 시장전략에 관한 기초연구)

  • Park, Seong-Sik
    • Cartoon and Animation Studies
    • /
    • s.28
    • /
    • pp.235-263
    • /
    • 2012
  • Regarding the theme park business as an area of cultural content business, this study focuses on the trend of pursuing indoor theme parks as a small-scale small capital strategy escaped from the existing approach oriented to large-scale outdoor complex theme parks. It is because although existing large-scale outdoor complex theme parks require the capital with the scale of hundreds of billion won and also high-level technique and the latest operational know-how that they have a great barrier for new entry as well as enormous risk, the rent indoor theme parks succeed in market entry with efficient risk management and flexible market strategies. Thereupon, this study examines the current status of the children's indoor theme park market with Korean characters as their theme as a new market among the indoor theme parks and also investigates the market strategies of this market in the two aspects of expansion: the expansion of Korean characters' property value and the expansion of the local theme park market. For that, this article reviewed the advanced researches on theme parks and divided the types of theme parks existing in Korea with the criteria of classification by space and theme or classification by main users. Also, among the children's indoor theme parks with Korean characters as their theme, this study visited five ones located in the capital area to examine the current status. And about two located in the capital area and also four in the local area, the current data were received from the persons in charge of the companies for analysis. Also, with the subjects of spectators visiting the 'DIBO VILLAGE, Cheonggye-cheon' newly opened on April 25th, 2012, the research on satisfaction was conducted for analysis. Through that, this study analyzed the structure of the existing children's indoor theme park business with Korean characters as their theme and suggested the ground to analyze the effectiveness of market strategies being implemented. It is expected that this study will establish the clues of systematic and profound discussion for the indoor theme park business that can be said to be the niche market of the theme park business and allow the small-scale areal indoor theme parks to be examined as a significant business model for the local theme park industry. In the aspect of character business as well, it is expected that this will give a chance to establish a new model of spatial storytelling expansion in terms of the property value of Korean animation characters.

Tracing the Development and Spread Patterns of OSS using the Method of Netnography - The Case of JavaScript Frameworks - (네트노그라피를 이용한 공개 소프트웨어의 개발 및 확산 패턴 분석에 관한 연구 - 자바스크립트 프레임워크 사례를 중심으로 -)

  • Kang, Heesuk;Yoon, Inhwan;Lee, Heesan
    • Management & Information Systems Review
    • /
    • v.36 no.3
    • /
    • pp.131-150
    • /
    • 2017
  • The purpose of this study is to observe the spread pattern of open source software (OSS) while establishing relations with surrounding actors during its operation period. In order to investigate the change pattern of participants in the OSS, we use a netnography on the basis of online data, which can trace the change patterns of the OSS depending on the passage of time. For this, the cases of three OSSs (e.g. jQuery, MooTools, and YUI), which are JavaScript frameworks, were compared, and the corresponding data were collected from the open application programming interface (API) of GitHub as well as blog and web searches. This research utilizes the translation process of the actor-network theory to categorize the stages of the change patterns on the OSS translation process. In the project commencement stage, we identified the type of three different OSS-related actors and defined associated relationships among them. The period, when a master commences a project at first, is refined through the course for the maintenance of source codes with persons concerned (i.e. project growth stage). Thereafter, the period when the users have gone through the observation and learning period by being exposed to promotion activities and codes usage respectively, and becoming to active participants, is regarded as the 'leap of participants' stage. Our results emphasize the importance of promotion processes in participants' selection of the OSS for participation and confirm the crowding-out effect that the rapid speed of OSS development retarded the emergence of participants.

  • PDF