• Title/Summary/Keyword: End-user

Search Result 1,211, Processing Time 0.026 seconds

Analysis of Operation Performance between Computerization Accounting Training and Accounting Information Systems (전산회계교육과 회계정보시스템 운영성과 분석)

  • Kim, Dong-Il;Choi, Seung-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4244-4250
    • /
    • 2010
  • This study analyzed relation with accounting information system operations of more integration and end-user's business processing capabilities. Also, Studied the correlation that has reflecting between business computer skills and training experience level of end-user in practical operation. In summary of this study, first, found out that the improvement and training level of computerized accounting training in mid-size enterprise can be processing more effectively an accounting information business. Second, the end-user training and business development of business processes using the system, the positive impact was significant. Finally, the introduction of the continuous integration system based on new technology analyzed more lower overall performance satisfaction of end-user in the tasks. Business Ability of end-user could be important factor as ongoing business development and training. The results of this study, It can support to effective strategies of end-user systems, will expected to further strengthen competitiveness in the future.

NREH: Upper Extremity Rehabilitation Robot for Various Exercises and Data Collection at Home (NREH: 다양한 운동과 데이터 수집이 가능한 가정용 상지재활로봇)

  • Jun-Yong Song;Seong-Hoon Lee;Won-Kyung Song
    • The Journal of Korea Robotics Society
    • /
    • v.18 no.4
    • /
    • pp.376-384
    • /
    • 2023
  • In this paper, we introduce an upper extremity rehabilitation robot, NREH (NRC End-effector based Rehabilitation arm at Home). Through NREH, stroke survivors could continuously exercise their upper extremities at home. NREH allows a user to hold the handle of the end-effector of the robot arm. NREH is a end-effector-based robot that moves the arm on a two-dimensional plane, but the tilt angle can be adjusted to mimic a movement similar to that in a three-dimensional space. Depending on the tilting angle, it is possible to perform customized exercises that can adjust the difficulty for each user. The user can sit down facing the robot and perform exercises such as arm reaching. When the user sits 90 degrees sideways, the user can also exercise their arms on a plane parallel to the sagittal plane. NREH was designed to be as simple as possible considering its use at home. By applying error augmentation, the exercise effect can be increased, and assistance force or resistance force can be applied as needed. Using an encoder on two actuators and a force/torque sensor on the end-effector, NREH can continuously collect and analyze the user's movement data.

A Study on the Effect Degree of the Use of Computer Assisted Reporting on the User Satisfaction and Job Performance (컴퓨터활용취재(Computer Assisted Reporting)의 사용도가 만족도 및 직무성과에 미치는 영향 연구)

  • Park Hyun Soo;Yang Kyung Sik;Kim Hyun Soo
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.3
    • /
    • pp.117-135
    • /
    • 2004
  • The purpose of this research is to examination whether End-User Computing relative factors are ap-plied in Computer Assisted Reporting. Computer Assisted Reporting is closely related to End-User Computing, because IT and IS be used by reporting for data gathering and analysis. For the purpose, we've produced a survey, and then studied the effects of the use of Computer Assisted Reporting tools on the report's satisfaction and job performance. As a result, The degree of use of Computer Assisted Reporting significantly affects the degree of satisfaction and job performance. for this reason, this research can give an insight for the extension of End-User Computing relative research.

  • PDF

A Study of the Effect on the End-User Satisfaction Changing Information Center in Systems Perspective (시스템측면에서의 정보센터 개념변화가 사용자 만족도에 미치는 영향에 관한 연구)

  • 윤중현
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.1
    • /
    • pp.75-91
    • /
    • 2003
  • The purpose of this study is to identify the new roles and services of information center that is affected by changing information technology and end-user computing environment. A user satisfaction model has been used and hypotheses are developed to find relationships information center service evaluation factors. The hypotheses have been tested with 41 user surveys. This study presents the relationship between certain information center management variables and the end-user satisfaction applying organization-wide information service. The result of this research can give an insight of the evaluation of information center service activities.

Construction Of The Measurement Model Of User Satisfaction In Internet Shopping Environment -Based On The End-Use Computng Satisfaction Instrument -

  • Kim, Tae-Hwan
    • International Commerce and Information Review
    • /
    • v.8 no.1
    • /
    • pp.3-13
    • /
    • 2006
  • To develop and validate an instrument to measure user satisfaction in Internet shopping environment, the EUCS instrument by Doll and Torkzadeh (1988) was used for this research. The results of the study shows how the main constructs of the model that will eventually interact for the user satisfaction in internet commerce environment. This research will present significant progress towards keeping the End-User Computing Satisfaction instrument relevant and applicable under the Internet shopping environment.

  • PDF

Authentication and Key Agreement Protocol for Secure End-to-End Communications on Mobile Networks

  • Park, Jeong-Hyun;Kim, Jin-Suk;Kim, Hae-Kyu;Yang, Jeong-Mo;Yoo, Seung-Jae
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.256-259
    • /
    • 2003
  • This paper presents mutual authentication scheme between user and network on mobile communications using public key scheme based on counter, and simultaneously shows key agreement between user and user using random number for secure communications. This is also a range of possible solutions to authentication and key agreement problem-authentication and key agreement protocol based on nonce and count, and secure end-to-end protocol based on the function Y=f(.)$\^$1/, C$\^$i/ is count of user I, and f(.) is one way function.

  • PDF

Evaluating End-User Computing Capability in Total Perspective

  • Yoon, Chui-Young
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.357-362
    • /
    • 2007
  • This study presents a methodology that efficiently evaluates and interprets the end-user computing capability in a total perspective in a computing environment. The evaluation system has an evaluation tool, evaluation method and process, and an interpretation system. The validity and reliability of the developed tool construct was verified by factor and reliability analysis with the application of SPSS software. The application and utilization of the developed system was confirmed by applying it to evaluating the computing competency of 316 workers in an enterprise and presenting its evaluation results. This will contribute to developing a methodology for totally evaluating and interpreting the end-user computing capability and improving their computing capability in industrial fields.

  • PDF

A Study on Improvement of Password Algorithm (패스워드 알고리즘의 개선에 관한 연구)

  • 김영수;박연식;임재홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.287-293
    • /
    • 1999
  • The first stage for computer security is password. If security of password is impotent even constructing of perfect fire-wall, fire-wall is not anything but a good-for-nothing. Because management of password is depend upon an end-user rather than a system-manager, carelessness of password management is an inevitable result. It is a reason that an end-user is actually not able to manage a high-difficulty-password. In this paper, algorithm of password is improved to be difficult of hacking, having a existing password input pattern for an end-user.

  • PDF

An analysis of the End-User electric power consumption trends using the load curve during international conflict (수용가 부하곡선을 일용한 국제분쟁시 전력사용 행태분석)

  • Son Hak Sig;Kim In Su;Park Yong Uk;Im Sang Kug;Kim Jae Chul
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.165-167
    • /
    • 2004
  • End-user electric power consumption trends shows various load curves dependant on industry, contract, season, day and time. Analysis of end-user electric power consumption trends has a key role to efficiently meet electricity demand. There are several factors of change in electricity demand such as the change of weather, international conflict, and industrial trends during summer. This paper has analyzed the analysis the end-user electric power consumption trends using the load curve during international conflict. We observed that international conflict decreased electric demand by $5.4\%$. This increase is not significant, and therefore we conclude that the international conflict has not greatly affected Korea's electricity demands. This paper provides useful information so as to mon: efficiently perform demand side management.

  • PDF

Extensional End-to-End Encryption Technologies to Enhance User's Financial Information Security and Considerable Security Issues (이용자의 금융거래정보 보호를 위한 확장 종단간(End-to-End) 암호화 기술과 보안고려사항)

  • Seung, Jae-Mo;Lee, Su-Mi;Noh, Bong-Nam;Ahn, Seung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.145-154
    • /
    • 2010
  • End-to-End(E2E) encryption is to encrypt private and important financial information such as user's secret access numbers and account numbers from user's terminal to financial institutions. There has been found significant security vulnerabilities by various hacking in early E2E encryption system since early E2E encryption is not satisfied the basic security requirement which is that there does not exist user's financial information on plaintext in user's terminal. Extensional E2E encryption which is to improve early E2E encryption provides confidentiality and integrity to protect user's financial information from vulnerabilities such as alteration, forgery and leakage of confidential information. In this paper, we explain the extensional E2E encryption technology and present considerable security issues when the extensional E2E encryption technology is applied to financial systems.