• Title/Summary/Keyword: Application(App)

Search Result 736, Processing Time 0.026 seconds

Research on Usability of Seoul Bike based on Seoul Universal Guideline -Focusing on seoul citizens over-50s (서울시 유니버설디자인 통합 가이드라인을 기반으로 한 서울자전거 '따릉이' 사용성 연구 -50대 이상 서울시민을 대상으로-)

  • Kim, Tae-Hee;Kim, Boyeun
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.287-293
    • /
    • 2019
  • The purpose of this study is to research on usability of Seoul Bike focusing on seoul citizens over-50s. Before the test, I researched Seoul Universal Design Guideline's background, purpose, principle and range through literature review. Then I did two tests based on re-establishment of the existing principle to fit the public service. First, I have noticed that using the service through an application was difficult for seoul citizens over-50s even if they have NEEDS for using Seoul Bike according to the survey. Next, I drew the result from User Task Evaluation Analysis. Due to the low app usability(the main point of the service) and accessibility and usability status was rate low, but the overall service process was comfortable and convenience. I expect this study will be a good resouce for public service design.

Consumer Attitudes, Intention to Use Technology, Purchase Intention of Korean 20's Women on the Acceptance of Fashion Augmented Reality (FAR) with the Application of the UTAUT Model (UTAUT 모델을 응용한 패션 증강현실(FAR) 기술수용에 관한 한국 20대 여성의 소비자 태도, 기술 사용의도 및 구매의도)

  • Cho, Sung Hee;Kim, Chil Soon
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.43 no.1
    • /
    • pp.125-137
    • /
    • 2019
  • This study determined the impact of 'Fashion Augmented Reality (FAR)' acceptance factors based on the model of acceptance and use of technology (UTAUT) on consumer attitudes, intention to use technology, and fashion product purchase intention. A survey asked participants to have an AR experience using a FAR app to understand FAR in advance. Data were analyzed factor analysis and stepwise regression using SPSS. The results are as follows. First, the factor analysis classified the acceptance variables of FAR technology into 'social relations', 'shopping effectiveness', and 'easy to use FAR'. Second, among the three factors of FAR acceptance, 'shopping effectiveness' is statistically more influential on positive attitudes towards FAR. However, 'easy to use' factor was more influential on 'the intention to use technology' as well as 'purchase intention'. Third, 'social relations' were identified as an important factor affecting 'consumer attitudes', 'intention to use technology' and 'purchase intention' which are not well covered in fashion technology research. In addition, 'the intention to use technology' was found to be influential on 'purchase intention' and indicated the importance of easiness of FAR to enhance purchase intention.

Security Analysis on 'Privacy-Preserving Contact Tracing Specifications by Apple and Google' and Improvement with Verifiable Computations ('애플과 구글의 코로나 접촉 추적 사양'에 대한 보안성 평가 및 검증 가능한 연산을 이용한 개선)

  • Kim, Byeong Yeon;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.291-307
    • /
    • 2021
  • There has been global efforts to prevent the further spread of the COVID-19 and get society back to normal. 'Contact tracing' is a crucial way to detect the infected person. However the contact tracing makes another concern about the privacy violation of the personal data of infected people, released by governments. Therefore Google and Apple are announcing a joint effort to enable the use of Bluetooth technology to help governments and health agencies reduce the spread of the virus, with user privacy and security central to the design. However, in order to provide the improved tracing application, it is necessary to identify potential security threats and investigate vulnerabilities for systematically. In this paper, we provide security analysis of Privacy-Preserving COVID-19 Contact Tracing App with STRIDE and LINDDUN threat models. Based on the analysis, we propose to adopt a verifiable computation scheme, Zero-knowledge Succinctness Non-interactive Arguments of Knowledges (zkSNARKs) and Public Key Infrastructure (PKI) to ensure both data integrity and privacy protection in a more practical way.

Effects of Menu Arrangement and User Script on Task Using Smartphone Applications (메뉴의 배열과 사용자 스크립트가 스마트폰 애플리케이션 과제 수행에 미치는 효과)

  • Min, Sungki;Park, Soo-Young;Lee, Sangil
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.67-76
    • /
    • 2021
  • Three research hypotheses expected when working with a mobile app were verified. As follows: (1) Usability varies depending on the external structure of the tree-view menu. (2) If the menu arrangement is different from the script expected by users, the usability is poor. And (3) the effects of each of these two hypotheses vary depending on the complexity of the task. To this end, a script for booking accommodations expected by undergraduate students was written, and an experiment was designed with the task completion time and error rate as dependent variables. The experiment was conducted by implementing a prototype for reservation system on a smartphone As a result, while the overall performance was unfavorable when the task was complicated, the superiority of sectional menu was prominent when the task was complicated, and positive responses were observed when the menu arrangement in a complicated task matched user expectations. By discussing these results, it was found that when designing a procedural menu on a mobile screen, we come up with measures to minimize the burden of working memory, consider what tree-views are for the task, and that in complex tasks, menus should be arranged according to the scripts expected by users.

Usability Principles for a Mobile Augmented Reality Application -Focus on Wayfinding- (증강현실 기반 모바일 애플리케이션의 사용성 원칙 연구 -길찾기 서비스 중심으로-)

  • Yoo, Chang-Hwa;Oh, Dong-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.643-651
    • /
    • 2022
  • The mobile augmented reality(MAR) market is rapidly growing with following the sudden rise of the metaverse. However, research on improving user experience in mobile augmented reality environment is lacking. This study aims to develop the usability principles of an AR-based smartphone app. The research conducts following methods. 1)The characteristics of MAR were understood to identify usability elements of AR apps. 2)Usability principles were collected through analysis of case studies on the usability of AR and the 14 usability principles were developed through in-depth interviews with experts for the purpose of chunking. 3)To verify the 14 developed usability principles, evaluation items were composed based on the usability principles and usability evaluation survey was conducted. Consequently, significant differences were found in immersivity, presence, efficiency, satisfaction, playfulness and It was verified that the developed usability principle is useful in developing AR based smartphone apps. This study is meaningful in that it conducted the basic research of mobile AR usability principles

The Detection of Android Malicious Apps Using Categories and Permissions (카테고리와 권한을 이용한 안드로이드 악성 앱 탐지)

  • Park, Jong-Chan;Baik, Namkyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.6
    • /
    • pp.907-913
    • /
    • 2022
  • Approximately 70% of smartphone users around the world use Android operating system-based smartphones, and malicious apps targeting these Android platforms are constantly increasing. Google has provided "Google Play Protect" to respond to the increasing number of Android targeted malware, preventing malicious apps from being installed on smartphones, but many malicious apps are still normal. It threatens the smartphones of ordinary users registered in the Google Play store by disguising themselves as apps. However, most people rely on antivirus programs to detect malicious apps because the average user needs a great deal of expertise to check for malicious apps. Therefore, in this paper, we propose a method to classify unnecessary malicious permissions of apps by using only the categories and permissions that can be easily confirmed by the app, and to easily detect malicious apps through the classified permissions. The proposed method is compared and analyzed from the viewpoint of undiscovered rate and false positives with the "commercial malicious application detection program", and the performance level is presented.

Proposal on the Improvement Direction of Web App Development lecture for Non-IT majors

  • Kim, Koono
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.4
    • /
    • pp.231-239
    • /
    • 2022
  • In this paper, I analyze the difficulties of web service development education for non-IT majors through the Q&A of students posted in the k-mooc lecture, and propose methods to improve them. Through Q&A analysis, it was confirmed that non-majors mainly had difficulties in using unfamiliar tools, cost of cloud service, setting up server environment, and writing code while taking web service development courses. To solve this problem, I propose a method to reduce the server cost problem and the complexity of the server environment by using BaaS(Backend as a Service), which is one of the cloud service models. It also shows that it is possible to reduce the length of code that needs to be written at once by using the React library to modularize long code into smaller units. Finally, I propose an improvement plan that even non-IT majors can easily learn by implementing a web application that works by using the design output obtained by using Figma.

Smart Harness for Preventing Pet Loss Outdoors (실외에서 애완견 분실 방지를 위한 스마트 어깨줄)

  • Lee, Jun-Hyeok;Ruy, Se-Hyun;Lim, Jong-Chan;Chou, Tea-Hyun;Han, Yeong-Oh
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.4
    • /
    • pp.709-718
    • /
    • 2021
  • In this paper, it can be seen that the number of abandoned dogs increases every year through the statistics on the occurrence of abandoned animals. With the goal of reducing the number of stray dogs, a smart pet dog shoulder strap is implemented based on a real-time location tracking system using the ESP32 module and GPS sensor. It is an ESP32 module with a built-in Bluetooth module. It is input to the MCU using various sensors, and finally outputs to a smart-phone application, and communicates through the built-in blue-tooth module. In addition, it uses Neopixels to compensate the weaknesses at night through LED light emission, and automatically sets the warning distance to design a music playback system through the LED flashing effect and MP3 module. In addition, a smart pet dog shoulder strap was designed to help pet dog health care by measuring the moving distance according to the amount of activity through the gyro sensor.

Risk Situation Detection Safety Helmet using Multiple Sensors (다중 센서를 이용한 위험 상황 감지 안전모)

  • Woo-Yong, Choi;Hyo-Sang, Kim;Dong-Hyeon, Ko;Jang-Hoon, Lee;Seung-Dae, Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1226-1274
    • /
    • 2022
  • In this paper, we dealt with a safety helmet for detecting dangerous situations that focuses on falling accidents and gas leaks, which are the main causes of industrial accidents. the fall situation range was set through gravity acceleration measurement using an acceleration sensor, and as a result, a fall detection rate of 80% could be confirmed. .In addition, the dangerous gas concentration was measured through a gas sensor, and when a digital value of 188 or more was output through a serial monitor, it was determined as a gas dangerous situation, and a fall warning message and a gas warning message could be checked through a smart-phone application produced based on the app inventor program.

Development of a System for Field-data Collection Transmission and Monitoring based on Low Power Wide Area Network (저전력 광역통신망 기반 현장데이터 수집 전송 및 모니터링 시스템 개발)

  • Yeong-Tae, Ju;Jong-Sil, Kim;Eung-Kon, Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1105-1112
    • /
    • 2022
  • Field data monitoring systems such as renewable energy generation and smart farm integrated control are developing from PC and server to mobile first, and various wireless communication and application services have emerged with the development of IoT technology. Low-power wide-area networks are services optimized for low-power, low-capacity, and low-speed data transmission, and data collected in the field is transmitted to designated storage servers or cloud-based data platforms, enabling data monitoring. In this paper, we implement an IoT repeater that collects field data with a single device and transmits it to a wireless carrier cloud data flat using a low-power wide-area network, and a monitoring app using it. Using this, the system configuration is simpler, the cost of deployment and operation is lower, and effective data accumulation is possible.