• 제목/요약/키워드: Application(App)

Search Result 731, Processing Time 0.053 seconds

Design and Implementation of Job Training Management System by Considering Multi-Devices (다양한 디바이스를 고려한 직업훈련관리 시스템 설계 및 구현)

  • Kim, Ho-Jin;Kim, Chang-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.934-940
    • /
    • 2014
  • Recently, the emergence of a variety of devices to be able to access web have brought many technological changes in the field of web development. However some web sites are still operating with a focus on computers, especially exclusive and slow developing job training related web sites which utilize a User Interface that targets only PCs. In this paper, we propose the job training management system which has a menu configuration and functions to be applied to a variety of devices, and also an applicable technologies for training students to access more easily. Finally, we evaluated its efficiency by applying the implemented system in the actual field.

Real Time Framework Design based on Android Platform (안드로이드 플랫폼을 기반으로 한 실시간 프레임워크 설계)

  • Kang, Ki-Woong;Han, Kyu-Cheol;Jang, Seung-Jin;Lim, Se-Jung;Kim, Kwang-Jun;Jang, Chang-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.11
    • /
    • pp.1255-1266
    • /
    • 2014
  • This thesis presents MPU module, Base board and sensor module which are efficient industrial control through design and manufacture as developing S5PV210 CPU of SAMSUNG used by ARM Cortex-A8 based on Android which is Open mobile platform is installed to embedded system. Data for temperature and humidity which are received by sensor module proved the suitability and validity for the real time framework design as implementing application program employed the smart phone App with hybrid application based on DB of web server.

Generation YZ's E-Healthcare Use Factors Distribution in COVID-19's Third Year: A UTAUT Modeling

  • Michael CHRISTIAN;Kurnadi GULARSO;Prio UTOMO;Henilia YULITA;Suryo WIBOWO;Sunarno SUNARNO;Rima MELATI
    • Journal of Distribution Science
    • /
    • v.21 no.7
    • /
    • pp.117-129
    • /
    • 2023
  • Purpose: With the number of COVID-19 cases declining and generational differences among how people use mobile apps, including health service apps, the goal of this research is to identify and analyze the factors that affect people's attitudes when using the Halodoc health service app during the third year of the pandemic. Research design, data, and methodology: This study proposes a quantitative analysis method based on PLS-SEM modeling. This study has used a questionnaire survey to collect randomized data from 268 Halodoc users from generations Y and Z in Jakarta. Results: Both the Y and Z generations believe there is a significant usefulness factor in the attitude toward using the application. The start of the pandemic period demonstrates that the urgency of using health service applications is no longer determined by performance expectations, effort, or social panic, but rather by these applications' usability. Conclusions: Even though a health service application is no longer considered an urgent service or a priority need, attitudes, and behaviors in using it emphasize the aspect of long-term benefits. These findings supplement other considerations and understandings in application of the Unified Theory of Acceptance and Use of Technology (UTAUT) model in explaining attitudes and intention behaviors.

Adoption of Mobile Peer-to-Peer Payment: Enabling Role of Substitution and Social Aspects

  • Clement Jun Feng Lim;Byungwan Koh;Dongwon Lee
    • Asia pacific journal of information systems
    • /
    • v.29 no.4
    • /
    • pp.571-590
    • /
    • 2019
  • Despite the growing amount of mobile peer-to-peer (P2P) payment applications available on mobile app stores, these applications are still in their infancy and have yet to see mass adoption. This study aims to explore the factors that influence the adoption of such mobile P2P payment applications by using a large-scale data set based on the tracking of users' actual mobile application usage behavior. Our main findings reveal that the duration of each session that users use of traditional bank application has a significant relationship with their adoption of mobile P2P payment applications. In addition, we explore the social aspect of such mobile P2P payment applications by analyzing their social network applications usage and found that the amount of social network service applications used and usage duration positively impacted one's adoption of mobile P2P payment applications. These findings have important theoretical and practical implications for stakeholders of mobile P2P payment solution providers as well as intermediaries/banks who provide their own payment applications to their customers.

An Exploratory Study on the Determinants of Mobile Application Purchase (모바일 앱 구매 결정에 끼치는 영향요인 : 탐색적 연구)

  • Kim, Hee-Woong;Lee, Hyun-Lyung;Choi, Su-Jin
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.173-195
    • /
    • 2011
  • The ability of offering various and abundant mobile applications has emerged as the knowledge of the smartphone has grown in the smartphone market. The mobile application market has emerged as a competitive new market with enormous potential. Although many users download paid or free mobile applications through the app markets such as the Appstore, there is no significant research regarding customer's application purchase yet. Hence, we refer to the purchase motivation of mobile applications among experienced users who have bought paid applications. We conducted the interview with 30 users and suggest four categories of applications (productivity, entertainment, information, and social networking) and also classify the purchase intentions on each category based on the ground theory. The comparison analysis of the interview provides us what factors affect the application purchase. This framework may advance effective mobile application business model development, implicate the strategy for boosting mobile application market.

An Empirical Analysis on the Compromised Delivery Model of Traditional Market Using Delivery Application (배달앱을 활용한 전통시장 배송 모형에 관한 실증분석)

  • YOO, Chang-Kwon;KIM, Gi-Pyoung
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.10
    • /
    • pp.45-51
    • /
    • 2019
  • Purpose - The purpose of this study was to propose a win-win development plan for not only suppliers of delivery applications but also traditional market vendor companies and delivery riders by analyzing existing delivery models and presenting a new delivery model to enhance competitiveness of the traditional market using delivery apps. Research desgin, data, and methodology - Specifically, small retailers, such as traditional markets and supermarkets, presented a compromised delivery model that utilizes the platform of specialized delivery app service providers for order reception, and that the delivery is delivered by delivery systems jointly hired by Vendor companies, such as franchising companies. To validate the significance of the trade-off delivery model, a cost-benefit analysis was conducted by those involved in the delivery application. Results - From the perspective of suppliers of specialized delivery applications, it is analyzed that the use of specialized delivery applications in traditional markets will be a new market opportunity for service providers to achieve increased sales. It is expected that consumer choice and satisfaction will be increased as convenience and accessibility of traditional market businesses that were available only through direct visit from the user side of the delivery application will be expanded. From the standpoint of delivery application franchises, it is analyzed that they can seek to increase sales and increase customer service as well as ease labor cost burden due to joint employment of delivery riders. The delivery rider will be able to seek to improve customer service due to job security, wage stability, risk reduction and overheated competition due to direct employment. Conclusion - In conclusion, the compromised delivery model solved the problems raised in the preceding study conducted on delivery application suppliers, users, franchises, and riders to establish that it could be a strategic alternative to increasing sales and expanding detailed rights for the self-employed in the traditional market, which are experiencing difficulties in management. However, the adoption of a compromise delivery model requires social consensus from those involved in the delivery application and requires legal, institutional and policy support, which will require continued follow-up research on the delivery model in the future.

Development of Safety Activity Application and Usability Evaluation to Improve Risk Perception for Industrial Accident Prevention (산업재해 예방을 위한 위험 지각 증진 안전 활동 어플리케이션 개발 및 사용성 평가)

  • Jong Hyun Lee;Sieun Kim;Eunsol Cho;Kwangsu Moon
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.241-253
    • /
    • 2023
  • Purpose: The purpose of this study is to introduce the structure and functions of an application developed for enhancing risk knowledge/perception, called KNOWRISK, and to identify and determine problems and requirements based on the usability evaluation results of the application. Method: The evaluation was conducted using the Mobile App Rating Scale (MARS) with a sample of 43 application users and related experts. Result: The application received a satisfactory evaluation score with an overall average of 4.074 points, and there was no significant difference in evaluation scores between experts and users. The highest score was for ease of use at 4.47, while the lowest score was for cost payment usage at 2.88. Conclusion: The results of this study suggest that efforts to increase risk knowledge and promote safe behavior using a mobile application can be an effective and efficient strategy for preventing industrial accidents and enhancing safety management.

Mhealth apps: The current status of usage and the factors of continuous use (건강 어플리케이션 이용현황 및 지속적 사용요인 - 서울대학교 대학생 및 대학원생을 중심으로)

  • Suh, Hyojung;Hong, Hyeonseok;Kim, Minjeong;Yoon, Wonjung;Lee, Taehoon;Jung, Jiyun;Hwang, Shinha;Cho, Youngtae
    • Journal of the HCI Society of Korea
    • /
    • v.10 no.1
    • /
    • pp.19-27
    • /
    • 2015
  • As the mobile content industry is growing, mobile health (m-health) market is expanding based on various contents. It has developed in the way of utilizing health contents through mobile device such as smart phone among young people. This study aims to examine the usage of m-health application and factors of continuous usage among students in Seoul National University. The result is expected to provide a foundation for future health promotion programs utilizing m-health. The study analyzes the difference of application usage tendency based on demographic characteristic and the continuous usage, and compared the level of knowledge, attitude, belief, and practice (KABP) of mobile health application. 28% of the total sample population uses the application continuously, and their KABP level was higher than that of users that stopped using. This study goes beyond the previous studies of service satisfaction and acceptance analysis on the marketing level, and is meaningful in that it has analyzed the m-health application usage from the public health point of view.

REST API based Server Construction for Web Application Performance Analysis (웹 애플리케이션 성능 분석을 위한 REST API 기반의 서버 구축)

  • Kim, Hyun-gook;Park, Jin-tae;Choi, Moon-Hyuk;Moon, Il-young
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.456-461
    • /
    • 2018
  • Until the 4th Industrial Revolution fused the Web with diverse technologies, the only factor in evaluating the performance of a Web application was the loading speed of the Web application. Therefore, most existing Web application performance analysis tools focus on the speed at which Web applications run in a Web browser. However, the web is now being used not only in a simple web browser but also in a variety of services. So, in addition to simple speed, there are more elements to be checked to evaluate web applications. Therefore, in this paper, we design a server to perform web application performance analysis considering progressive web app, accessibility, best practice, and search engine optimization as well as the above mentioned speed. Also, we realize a REST API based server that can provide web application performance services without being affected by user's devices or environment.

Analysis of Malicious Behavior Towards Android Storage Vulnerability and Defense Technique Based on Trusted Execution Environment (안드로이드 저장소 취약점을 이용한 악성 행위 분석 및 신뢰실행환경 기반의 방어 기법)

  • Kim, Minkyu;Park, Jungsoo;Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.73-81
    • /
    • 2021
  • When downloading files using an app or web-based application on the user's mobile phone, the path is set to be saved in the pre-defined default directory. Many applications requiring access to storage, including file managers, require a write or read permission of storage to provide numerous functions and services. This means that the application will have direct access to the download folder where the numerous files downloaded. In this paper, to prove our feasibility of attack using the security vulnerabilities mentioned above, we developed a file hacking function disguised as an encryption function in the file management application. The file that encrypted will be sent to hackers via E-mail simultaneously on the background. The developed application was evaluated from VirusTotal, a malicious analysis engine, was not detected as a malicious application in all 74 engines. Finally, in this paper, we propose a defense technique and an algorithm based on the Trusted Execution Environment (TEE) to supplement these storage vulnerabilities.