• Title/Summary/Keyword: A potential user

Search Result 739, Processing Time 0.028 seconds

Predicting IT-based Robot Adoption in Korea: By Integrating TAM and EDT (IT기반 로봇의 수용에 관한 연구: TAM과 EDT 모형의 통합관점)

  • Kim, Yoo-Jung;Lee, Hyung-Seok;Yoon, Jong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.237-245
    • /
    • 2010
  • Korea Communications Commission (KCC) has been providing the pilot service of URC(Ubiquitous Robot Companion), which is a network-based personal robot, to 1000 Korean households since 2006 to define potential users' needs and adoption behaviors. Personal innovativeness might play a critical role in adoption of URC services by users because much sophisticated and convergence technologies are incorporated into URC services. Also, defining not only perceived beliefs about URC services but also expected beliefs about them are very crucial to reduce disconfirmation between users' perception and expectation of URC services. From this point of view, this paper aimed to examine robot users' adoption behavior by considering constructs such as personal innovativeness, usefulness (perceived usefulness - expected usefulness, P-E), user attitude, and intention to use. The findings reveal that personal innovativeness is negatively related to usefulness (P-E) whereas usefulness (P-E) influences significantly and positively on user attitude. It is also shown that usefulness (P-E) and user attitude have strong positive effects on intention to use.

Functions and Characteristics of Public Library Theme Collection: Focusing on the User-centered Classification Perspective (공공도서관 테마 컬렉션의 기능과 특성 - 이용자 중심 분류의 관점에서 -)

  • Baek, Ji-Won
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.52 no.4
    • /
    • pp.51-69
    • /
    • 2018
  • The purpose of this study is to analyze the potential use of the theme collection as a new classification method that reflects the interest of users in terms of classification and categorization. For this purpose, the background of the theme collection was identified based on the discussion of the library resource organization and the introduction of the curation service of bookstore. In addition, based on case analysis, which is building the theme collection, concrete concepts and characteristics of theme collection are derived. Based on the above discussion, the classification and categorization characteristics of public library themes collections were analyzed, and the characteristics and functions as a classification were compared with other categories relatively. Finally, the utility and applicability of the theme collection is presented and it is based on the discussions about the user-centered classification system design of the library in the future.

A Study on User Experience of the Metaverse Exhibition: Focusing on Prayer for Life Metaverse

  • Park, Ji-Su;Park, So-Jeong;Park, So-Eun;Shin, Ji-Hye;Rhee, Bo-A
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.89-98
    • /
    • 2022
  • Using the extended technology acceptance model, this study aims to quantitatively analyze the user experience with the . In the case of Perceived Usefulness and Perceived Ease of Use, only limited detailed factors have significant impacts on the degree of satisfaction. The degree of satisfaction has positive correlations with the degree of immersion and the variables of Behavioral Intention to Use Metaverse. Although sophisticatedly remediates using digital technology to provide visitors with the sameness of exhibits, exhibition circulation and interaction method, the metaverse exhibition does not acquire the same value of the exhibition. In conclusion, cannot replace , however, it has the potential to offer learning usefulness to visitors with low accessibility to the art museum.

Analysis and Classification of Security Threats based on the Internet Banking Service (인터넷 뱅킹 서비스에서의 보안위협 분류 및 분석)

  • Lee, Kyung-Roul;Lee, Sun-Young;Yim, Kang-Bin
    • Informatization Policy
    • /
    • v.24 no.2
    • /
    • pp.20-42
    • /
    • 2017
  • In this paper, we focus on classification of security threats and definitions of security requirements for Internet banking service. Threats are classified based on the past and potential incidents, based upon which we will be able to propose security requirements. In order to identify security threats, the structure of the Internet banking service is classified into three sections - the financial institutions, the network, and the user-terminal - and we defined arising threats for each section. We focused the analysis especially on the user-terminal section, which is relatively vulnerable, causing difficulties in securing stability of the service as a whole. The analyzed security threats are expected to serve the foundation for safe configuration of various Internet banking services.

A Study on the Countermeasures to Book Search Services of Web Portals: Focusing on Google Book Search (포털 도서검색서비스 대응방안에 대한 연구 - 구글도서검색을 중심으로 -)

  • Kim, Sung-Won
    • Journal of Korean Library and Information Science Society
    • /
    • v.42 no.1
    • /
    • pp.397-415
    • /
    • 2011
  • Google, an internet search service with extensive user base, has provided Book Search service. Google has pursued collaboration with publishers and libraries to obtain content for Book Search service; publisher community for the purpose of sourcing the books with copyrights, and the libraries for the purpose of digitizing their collections and also utilizing already digitized resources. Google Book Search Service has evoked significant controversy because of the potential monopoly problems and its risk, accompanied by Google's huge influence and broad user spectrum. This study, thus, suggests the countermeasures that library community should prepare in order to cope with the Google Book Search.

The Effect of Perceived Risk on the Intention to Adopt Mobile Banking Services (인지된 위험이 모바일 뱅킹 수용 의도에 미치는 영향)

  • Yang, Ji-Yun;An, Jung-Ho;Park, Cheol-U
    • Journal of Technology Innovation
    • /
    • v.14 no.3
    • /
    • pp.183-208
    • /
    • 2006
  • Mobile banking is one of the most representative services applied to the mobile technology. However, there are few recent studies about the user acceptance of mobile banking, and prior studies only have been related to the positive effects of the service acceptances such as e-commerce and Internet banking service. The purpose of this research is to grasp the particular risk essentials in mobile banking which customers perceive, and the risk degree of user recognition which affect customer intention to adopt mobile banking through the exploratory research. The perceived risk is segmented into the performance risk, financial risk, time risk, social risk (or psychological risk), and privacy risk based on Cunningham's research (1967) and other recent studies. In the Unified Theory of Acceptance and Use of Technology (UTAUT), we have attempted to determine how different perceived risks have influence on the mobile banking adoption intentions of both the mobile banking users and potential users. The results indicate that performance expectancy, effort expectancy, and social influence have positive influences on the intention to use mobile banking service while perceived risk has a negative influence on the intention to use and performance expectancy.

  • PDF

A Study on the Applicability of the Architectural design process using the Metaverse Experience and Technology - Case studies of Metaverse Platforms (메타버스의 경험과 기술을 활용한 건축설계 프로세스의 적용가능성에 관한 연구)

  • Chun, Soo-Kyung;Cha, Seung-Hyun
    • Journal of KIBIM
    • /
    • v.13 no.2
    • /
    • pp.16-28
    • /
    • 2023
  • The concept of the Metaverse has been around not only for play but also for daily use. The interest in Metaverse is increasing, and various industries such as medicine, media, and financial started to use the new technology for diverse purposes. In addition, interest in the Metaverse is increasing in the architectural industry, but not much research has been done yet. Recently, some studies started to study focusing on the architectural design of Metaverse and the technological characteristics of Metaverse. However, there are limited studies about the utilization of the Metaverse in the architectural design process or construction process. From this perspective, the study aims to analyze the applicability of the Metaverse in the architectural design process through Metaverse case studies. In order to accomplish the research goal, the study classified user experience and technology of Metaverse in the literature review and Metaverse use in other industries such as commercial, medical, media entertainment, and construction industry. Then, this study analyzes six representative Metaverse platforms according to the application of Metaverse in the architectural design process. Finally, this study discussed the future direction and potential of Metaverse application in the Architectural design process.

Social Tagging-based Recommendation Platform for Patented Technology Transfer (특허의 기술이전 활성화를 위한 소셜 태깅기반 지적재산권 추천플랫폼)

  • Park, Yoon-Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.53-77
    • /
    • 2015
  • Korea has witnessed an increasing number of domestic patent applications, but a majority of them are not utilized to their maximum potential but end up becoming obsolete. According to the 2012 National Congress' Inspection of Administration, about 73% of patents possessed by universities and public-funded research institutions failed to lead to creating social values, but remain latent. One of the main problem of this issue is that patent creators such as individual researcher, university, or research institution lack abilities to commercialize their patents into viable businesses with those enterprises that are in need of them. Also, for enterprises side, it is hard to find the appropriate patents by searching keywords on all such occasions. This system proposes a patent recommendation system that can identify and recommend intellectual rights appropriate to users' interested fields among a rapidly accumulating number of patent assets in a more easy and efficient manner. The proposed system extracts core contents and technology sectors from the existing pool of patents, and combines it with secondary social knowledge, which derives from tags information created by users, in order to find the best patents recommended for users. That is to say, in an early stage where there is no accumulated tag information, the recommendation is done by utilizing content characteristics, which are identified through an analysis of key words contained in such parameters as 'Title of Invention' and 'Claim' among the various patent attributes. In order to do this, the suggested system extracts only nouns from patents and assigns a weight to each noun according to the importance of it in all patents by performing TF-IDF analysis. After that, it finds patents which have similar weights with preferred patents by a user. In this paper, this similarity is called a "Domain Similarity". Next, the suggested system extract technology sector's characteristics from patent document by analyzing the international technology classification code (International Patent Classification, IPC). Every patents have more than one IPC, and each user can attach more than one tag to the patents they like. Thus, each user has a set of IPC codes included in tagged patents. The suggested system manages this IPC set to analyze technology preference of each user and find the well-fitted patents for them. In order to do this, the suggeted system calcuates a 'Technology_Similarity' between a set of IPC codes and IPC codes contained in all other patents. After that, when the tag information of multiple users are accumulated, the system expands the recommendations in consideration of other users' social tag information relating to the patent that is tagged by a concerned user. The similarity between tag information of perferred 'patents by user and other patents are called a 'Social Simialrity' in this paper. Lastly, a 'Total Similarity' are calculated by adding these three differenent similarites and patents having the highest 'Total Similarity' are recommended to each user. The suggested system are applied to a total of 1,638 korean patents obtained from the Korea Industrial Property Rights Information Service (KIPRIS) run by the Korea Intellectual Property Office. However, since this original dataset does not include tag information, we create virtual tag information and utilized this to construct the semi-virtual dataset. The proposed recommendation algorithm was implemented with JAVA, a computer programming language, and a prototype graphic user interface was also designed for this study. As the proposed system did not have dependent variables and uses virtual data, it is impossible to verify the recommendation system with a statistical method. Therefore, the study uses a scenario test method to verify the operational feasibility and recommendation effectiveness of the system. The results of this study are expected to improve the possibility of matching promising patents with the best suitable businesses. It is assumed that users' experiential knowledge can be accumulated, managed, and utilized in the As-Is patent system, which currently only manages standardized patent information.

Automatic Detection of Usability Issues on Mobile Applications (모바일 앱에서의 사용자 행동 모델 기반 GUI 사용성 저해요소 검출 기법)

  • Ma, Kyeong Wook;Park, Sooyong;Park, Soojin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.7
    • /
    • pp.319-326
    • /
    • 2016
  • Given the attributes of mobile apps that shorten the time to make purchase decisions while enabling easy purchase cancellations, usability can be regarded to be a highly prioritized quality attribute among the diverse quality attributes that must be provided by mobile apps. With that backdrop, mobile app developers have been making great effort to minimize usability hampering elements that degrade the merchantability of apps in many ways. Most elements that hamper the convenience in use of mobile apps stem from those potential errors that occur when GUIs are designed. In our previous study, we have proposed a technique to analyze the usability of mobile apps using user behavior logs. We proposes a technique to detect usability hampering elements lying dormant in mobile apps' GUI models by expressing user behavior logs with finite state models, combining user behavior models extracted from multiple users, and comparing the combined user behavior model with the expected behavior model on which the designer's intention is reflected. In addition, to reduce the burden of the repeated test operations that have been conducted by existing developers to detect usability errors, the present paper also proposes a mobile usability error detection automation tool that enables automatic application of the proposed technique. The utility of the proposed technique and tool is being discussed through comparison between the GUI issue reports presented by actual open source app developers and the symptoms detected by the proposed technique.

Increased Utilization of LTE-Maritime Networks Based on User Requirements (사용자 요구사항 기반 초고속 해상무선통신망 활용성 증대 방안에 대한 연구)

  • Sangjin JANG;Bu-Young KIM;Si-Hwan LEE;Hyo-Jeong KIM;Taehan SONG;Woo-Seong Shim
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.812-818
    • /
    • 2023
  • During the years 2016 to 2020, the Ministry of Oceans and Fisheries embarked on a strategic initiative to develop a comprehensive Korean e-navigation system, which encompassed the establishment of an 'Long Term Evolution for Maritime (LTE-M).' The primary objectives were to proactively align with international navigation standards and enhance maritime safety for small vessels, particularly fishing boats. However, limitations were identified in the utilization of this network, primarily its constrained application for specific purposes. In response to these limitations, this study delves into user-centric investigations through surveys and interviews, with the goal of expanding the horizon of network utilization. User requirements emerged as the result of study, emphasizing the need for broader network applications, a wider range of target users, diverse network utilization methods, and regulatory streamlining. The user-driven insights gleaned from this study hold the potential to inform and shape future legislative measures, fostering more versatile and inclusive LTE-M network utilization for enhanced maritime safety.