• Title/Summary/Keyword: 사용자 유형

Search Result 1,154, Processing Time 0.032 seconds

A Study on Consumers Purchasing Behavior of Mobile Shopping - User Characteristics, Flow, Perceived Risk, Involvement - (모바일 쇼핑의 소비자 구매행동에 관한 연구 - 사용자 특성, 플로우 경험, 지각된 위험, 관여 유형를 중심으로 -)

  • Song, Dong-Hyo;Kang, Sun-Hee
    • Management & Information Systems Review
    • /
    • v.34 no.3
    • /
    • pp.79-100
    • /
    • 2015
  • This study is to examine the factors that influence purchasing behavior and decision-making when consumers buy goods through mobile shopping, define purchasing decision-making with the steps of problem recognition, information search, alternative assessment, and purchasing behavior to understand mobile consumer behavior, and investigate how the factors of each step play roles and influence consumers' purchasing decision-making through positive analysis to figure out consumer purchasing behavior in mobile shopping. The study results, First, the user characteristics of information search influence flow. Second, in the relations between the user characteristics in the step of information search and perceived risk in alternative assessment, if recognition on gains is higher, perceived risk for time loss gets lower, and when the level of skills is higher, perceived risk gets higher, and it has been partly adopted that innovativeness does not influence risk perception. Third, in the relations between flow experience and purchasing intention, it has been found to be partially significant that remote presence and challenge do not influence purchasing intention but do influence excitement, attention concentration, and control and also do influence perceived risk and purchasing intention. Fourth, according to the results of analyzing the difference of consumer purchasing behavior by the types of involvement, practical involvement and sensual involvement, user characteristics and flow, and perceived risk differ by the types of products in terms of the search process, thereby changing purchasing intention. Lastly, the significance and limitations of this study was discussed.

  • PDF

Deep Learning Based User Safety Profiling Using User Feature Information Modeling (딥러닝 기반 사용자 특징 정보 모델링을 통한 사용자 안전 프로파일링)

  • Kim, Kye-Kyung
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.143-150
    • /
    • 2021
  • There is a need for an artificial intelligent technology that can reduce various types of safety accidents by analyzing the risk factors that cause safety accidents in industrial site. In this paper, user safety profiling methods are proposed that can prevent safety accidents in advance by specifying and modeling user information data related to safety accidents. User information data is classified into normal and abnormal conditions through deep learning based artificial intelligence analysis. As a result of verifying user safety profiling technology using more than 10 types of industrial field data, 93.6% of user safety profiling accuracy was obtained.

Research on Personalization for Social Network Service in IPTV (IPTV 소셜네트워크서비스를 위한 개인화에 관한 연구)

  • Kim, Hyun-Suk;Kim, So-Hyun
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.884-887
    • /
    • 2009
  • Social Network Service has been extremely popular these days and providing diverse features and functions to users. Social networking and interest sharing in between users are key factors of SNS and this circles back to draw more users to the service. Web is the first media to provide SNS and mobile is the next. The service based on mobile environmental uniqueness such as Location-based-service(LBS) is the key success factors to convert users to web SNS to mobile SNS. TV has also been a possible SSN market to draw users to share interests and participation. However TV has been always community electronics in family members and personalization to provide SNS has been barrier to overcome. In this study, we explorer ideas of key factors of personalization in TV environment and conducted a field study to define characteristics of TV personalization in terms of depth, method, style and structure. Research finds out that there are significant differences in these categories.

  • PDF

A Study on the Users' Perception of Autonomous Vehicles using Q Methodology (Q 방법론을 활용한 자율주행 자동차에 대한 사용자 인식에 관한 연구)

  • Lee, Young-Jik;Ahn, Hyunchul
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.5
    • /
    • pp.153-170
    • /
    • 2020
  • With the recent development of AI and ICT, autonomous vehicles are becoming a reality, and sales of the vehicles equipped with partial autonomous driving technology are also rapidly expanding. In this situation, technology research on autonomous vehicles has been actively conducted, but research on exploring the perception of autonomous vehicles from the user's perspective is relatively insufficient. Therefore, this study categorizes autonomous vehicle users into four types - , , , and . Then, it examines the characteristics of each type. For this purpose, we applied Q-methodology, a qualitative research method, to observe self-referent subjectivity of 32 P-samples using a Q-sample which consists of 34 statements. The results of our study have significance in that they provide domestic and global automakers with strategic directions for technological development and market expansion of autonomous vehicles, and academically provide hypotheses for subsequent quantitative research.

A Method of Detecting Real-Time Elevation of Privilege Security Module Using User Credentials (자격증명을 이용한 실시간 권한 상승 탐지 보안 모듈)

  • Sim, Chul Jun;Kim, Won Il;Kim, Hyun Jung;Lee, Chang Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.5
    • /
    • pp.247-254
    • /
    • 2017
  • In a Linux system, a user with malicious intent can acquire administrator privileges through attack types that execute shells, and can leak important user information and install backdoor program. In order to solve this problem, the existing method is to analyze the causes of the elevation of privilege, fix the problems, and then patch the system. Recently, a method of detecting an illegal elevated tasks in which information inconsistency occurs through user credentials in real time has been studied. However, since this credential method uses uid and gid, illegal elevated tasks having the root credentials may not be detected. In this paper, we propose a security module that stores shell commands and paths executed with regular privileges in a table and compares them with every file accesses (open, close, read, write) that are executed to solve the case which cannot detect illegal elevated tasks have same credential.

Encapsulation of SEED Algorithm in HCCL for Selective Encryption of Android Sensor Data (안드로이드 센서 정보의 선택적 암호화를 지원하는 HCCL 기반 SEED 암호의 캡슐화 기능 연구)

  • Kim, Hyung Jong;Ahn, Jae Yoon
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.2
    • /
    • pp.73-81
    • /
    • 2020
  • HCCL stands for Heterogenous Container Class Library. HCCL is a library that allows heterogeneous types of data to be stored in a container as a single record and to be constructed as a list of the records to be stored in database. With HCCL, encryption/decryption can be done based on the unified data type. Recently, IoT sensor which is embedded in smartphone enables developers to provide various convenient services to users. However, it is also true that infringement of personal information may occur in the process of transmitting sensor information to API and users need to be prepared for this situation in some sense. In this study, we developed a data model that enhances existing security using SEED cryptographic algorithms while managing information of sensors based on HCCL. Due to the fact that the Android environment does not provide permission management function for sensors, this study decided whether or not to encrypt sensor information based on the user's choice so that the user can determine the creation and storage of safe data. For verification of this work, we have presented the performance evaluation by comparing with the situation of storing the sensor data in plaintext.

Research on Possibilies of Social Network Services through IPTV (IPTV를 통한 SNS 가능성에 관한 연구)

  • Kim, Hyun-Suk;Kim, So-Hyun
    • Journal of the HCI Society of Korea
    • /
    • v.4 no.1
    • /
    • pp.11-15
    • /
    • 2009
  • Social Network Service has been extremely popular these days and providing diverse features and functions to users. Social networking and interest sharing in between users are key factors of SNS and this circles back to draw more users to the service. Web is the first media to provide SNS and mobile is the next. The service based on mobile environmental uniqueness such as Location-based-service(LBS) is the key success factors to convert users to web SNS to mobile SNS. TV has also been a possible SSN market to draw users to share interests and participation. However TV has been always community electronics in family members and personalization to provide SNS has been barrier to overcome. In this study, we explorer ideas of key factors of personalization in TV environment and conducted a field study to define characteristics of TV personalization in terms of depth, method, style and structure. Research finds out that there are significant differences in these categories.

  • PDF

Strategy development through Quality Assessments of Mobile Banking Service (모바일 뱅킹 서비스 품질 측정을 통한 전략 도출)

  • Yang, Ji-Youn;Yeo, Kyu-Hun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.2
    • /
    • pp.35-46
    • /
    • 2008
  • This research developed a strategy for mobile banking services based on the important factors deduced from quality assessment of mobile banking service that is experiencing rapid growth of user. SERVQUAL model and importance-performance tool were used. First, SERVQUAL model uses the important factors of mobile banking service selected from literature reviews. As a result, four dimensions that affect user satisfaction are found; assurance, customer orientation, tangibility, and reliability. Second, importance-performance analysis is to develop the strategy using the four factors. The final results revealed that assurance dimension had the strongest influence on user satisfaction. Assurance dimension of high expectation and yet low real performance needs immediate improvement. Customer orientation dimension of low expectation and performance should be reconsidered definition of satisfaction. On the other hand, tangibility dimension of higher performance than expectation is simply to maintain current level. Reliability dimension of high expectation and performance is recommended consistent management.

  • PDF

A Conceptual Model for Location Based Public Transit Transfer Information Service (사용자 위치기반 환승정보서비스 개념모델)

  • Lim, Jung-Sil;Moon, Young-Jun;Oh, Young-Tae;Lee, Choul-Ki;Bae, Myoung-Hwan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.4
    • /
    • pp.1-12
    • /
    • 2008
  • The issues of developing the value added services for public transport connectivity and transfer with information and communication technologies has been discussed in terms of incorporating system facilities with public transit modes to increase the ridership of public transit. This paper demonstrates a conceptual model for providing the location based public transit transfer information service on demand with respect to system requirements, subsystems, and logical architecture based on the national ITS architecture. The subsystems in this study which include transfer information center, parking concierge, user route guidance and information provision system are also investigated in detail in order for information service and/or contents provider to develop business models on public transit connectivity and transfer. This model is expected to be utilized in providing the variety of service models with the different types of public transit connectivity and transfer systems according to the system scale and the public transit modes.

  • PDF

Direction of Touch Gestures and Perception of Inner Scroll in Smartphone UI (스마트폰 UI에서 터치 제스처의 방향성과 이너 스크롤의 인지)

  • Lee, Young-Ju
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.409-414
    • /
    • 2021
  • In this paper, we investigated the touch gestures of the scroll direction of a small and long UI due to the characteristics of a device in a smartphone environment that has become popular and used. Touch gestures are touched and directed by triggers such as metaphors and affordances based on past experiences. Different types of touch gestures are used depending on the type of navigation, motion, and transformation gesture, but scrolling is the most frequently used among them. In general, the scroll is vertically scrolled, but recently, a design pattern that can be scrolled left and right inside is arranged to cause cognitive dissonance of users. In the use of an inner scroll that can scroll left and right by covering a part of the right content, the mixing of a non-scrollable design pattern becomes a factor that requires attention to the user. Therefore, it was found that the use of triggers and the use of consistent design patterns can enhance the user experience even in the inner scroll environment.