• Title/Summary/Keyword: Experience device

Search Result 568, Processing Time 0.026 seconds

Awareness, need and demand for the amendment of medical device law according to the general characteristics of some dental hygienists (일부 치과위생사들의 일반적 특성에 따른 의료기사법 개정에 대한 인식, 필요 및 요구도)

  • Lee, Hyeon-Jeong;Kwak, Ji-Won;Lee, Dong-Ha;Lee, Hyeon-Hee;Jeong, Hae-Mi;Joo, Soo-Yeon;Seong, Mi-Gyung
    • Journal of Korean Dental Hygiene Science
    • /
    • v.1 no.1
    • /
    • pp.23-36
    • /
    • 2018
  • This research has been conducted from June 1, 2017 to August 25, 2017 for the dental hygienists working in Busan and Gyeongnam area, to provide necessary basic data for the purpose of revision of the relating laws from the analysis of their understanding and perspective on such laws through 262 subjects' questionnaire. Its analysis of their perspectives are as follows. 1. The common characteristics of the subjects are that 40.1% of them are under 25, and their working period was under three years with the 38.9%, and as for their marital status, 70.2% were single, the final education of 80.2% were associated degrees. Their working areas are centered in Gyeongsangnam-do province with 91.2%, the workplace type is for the dental clinic with 80.2%. 2. The comparison of the view point of the medical(technician) law according to the characteristics of the research subjects differed only whether or not the completion of the education, and as a result of the comparison according to the characteristics of those subjects understanding the details of the medical(technician) law, there was a significant difference saying "the current law has clear job description" depending on the working area or "the job duty is definite" depending on the job experience and job details. As for those saying "the job duty is definite", there was also significant difference depending upon marital status, final education and work details. There was no significant difference in all characteristics from findings of the necessity of legal system according to the subjects not understanding the medical(technician) law. 3. As a result of comparing the necessity of the medical(technician) law according to the characteristics of the research subjects, it was found that all the subjects accepted the necessity of the medical law revision including the dental hygienist in the medical person. The "necessity of the professional dental hygienist system" showed a significant difference depending upon the final education and medical institution type. Among the triggering factors in its amendment, there showed significant difference in the "cooperation of other organizations" and "solution of medical law problems" only in the final education. 4. As a result of comparison of the needs of the medical(technician) law revision according to the characteristics of the research subjects, it was found that the significant traits related to the age and job details showed "Legal responsibility would be increased" when the medical law is revised, in case that "it will help broaden the job extension", there showed a significant difference in career, final education, and working institution, and job details. "Legal protection is possible" showed significant difference except the age group and working area, and "it help the system settlement" showed in the final education. There was a significant difference in career, final education, and job details that "I can regulate the education and field practice", and the same in "my status will be improved" depending upon the final education, work area, and job details. Accordingly, in this research, for the establishment of more professional and comprehensive dental health service as suggested from the demand and necessity toward the medical(technician) Law by the dental hygienists.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Analysis of the growth environment and fruiting body quality of Pleurotus eryngii cultivated by Smart Farming (큰느타리(새송이)버섯 스마트팜 재배를 통한 생육환경 분석 및 자실체 품질 특성)

  • Kim, Kil-Ja;Kim, Da-Mi;An, Ho-Sub;Choi, Jin-Kyung;Kim, Seon-Gon
    • Journal of Mushroom
    • /
    • v.17 no.4
    • /
    • pp.211-217
    • /
    • 2019
  • Currently, cultivation of mushrooms using the Information and Communication Technology (ICT)-based smart farming technique is increasing rapidly. The main environmental factors for growth of mushrooms are temperature, humidity, carbon dioxide (CO2), and light. Among all the mentioned factors, currently, only temperature has been maintained under automatic control. However, humidity and ventilation are controlled using a timer, based on technical experience.Therefore, in this study, a Pleurotus eryngii first-generation smart farm model was set up that can automatically control temperature, humidity, and ventilation. After installing the environmental control system and the monitoring device, the environmental condition of the mushroom cultivation room and the growth of the fruiting bodies were studied. The data thus obtained was compared to that obtained using the conventional cultivation method.In farm A, the temperature during the primordia formation stage was about 17℃, and was maintained at approximately 16℃ during the fruiting stage. The humidity was initially maintained at 95%, and the farm was not humidified after the primordia formation stage. There was no sensor for CO2 management, and the system was ventilated as required by observing the shape of the pileus and the stipe. It was observed that, the concentration of CO2 was between 700 and 2,500 ppm during the growth period. The average weight of the mushrooms produced in farm A was 125 g, and the quality was between that of the premium and the first grade.In farm B. The CO2 sensor was in use for measurement purposes only; the system was ventilated as required by observing the shape of the pileus and the stipe. During the growth period, the CO2 concentration was observed to be between 640 and 4,500 ppm. The average weight of the mushrooms produced in farm B was 102 g.These results indicate that the quality of the king oyster mushroom is determined by the environmental conditions, especially by the concentration of CO2. Thus, the data obtained in this study can be used as an optimal smart farm model, where, by improving the environmental control method of farm A, better quality mushrooms were obtained.

A Study on Preschool Teachers' Dental Health Recognition and Behaviors about Preschoolchildren Dental Health Care (어린이집 교사의 구강보건실태와 유아구강보건관리에 대한 인식)

  • Lee, Hyang-Nim;Shim, Hyung-Sun
    • Journal of dental hygiene science
    • /
    • v.8 no.4
    • /
    • pp.283-289
    • /
    • 2008
  • This study was performed to obtain data about dental health to develop childrens' dental health education program. This research surved from from 22 July 2008 to 11 August 2008 and questionaire given to 140 teacher from Gwangsan-gu and Buk-gu and Dong-gu in Gwangju city. Collected data were analyzed with SPSS 12.0 program. The results of this study were as follows: 1. The dental health condition which teacher is recognizing is most with the facility 52.9% which is healthy, one day toothbrush qualitative number of times 3 times 67.1% and the dental floss qualitative number of times is 49.3%. Uses most the oral hygiene device which plentifully is 51.4% with the dental gargle solution, the dental problem which is knowing dental caries with 45.7% to be highest, perception dental sensitivity was 30.7%. 2. Periodical dental prosecuting says that 93.6% is executing, also the case which a dental inspection result in the parents notifies was 78.6%, after notifying treat, the case which confirms was 60.7%. The case which is the toothbrush qualitative time which is systematic was 95.0%, about dental healthily and food the case which executes an education was 93.6%. 3. About educational background by infantile dental health care of teacher with recognition currently the effectiveness of dental health care is higher from below junior college graduating (p < 0.05). dental hygienic relation experience event participation intention (p < 0.01) comes from the above of university graduation from infantile dental health care from important degree of teacher role was higher the junior college graduation group (p < 0.05). 4. Recognition there was not a difference which is beneficial with an educational background by about career by infantile dental health care of teacher. For the buccal cavity hygiene management of the infants thinks with the fact that also the development of the curricular material and the educational program and teacher buccal cavity hygiene education will be necessary.

  • PDF

Determinants of Mobile Application Use: A Study Focused on the Correlation between Application Categories (모바일 앱 사용에 영향을 미치는 요인에 관한 연구: 앱 카테고리 간 상관관계를 중심으로)

  • Park, Sangkyu;Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.157-176
    • /
    • 2016
  • For a long time, mobile phone had a sole function of communication. Recently however, abrupt innovations in technology allowed extension of the sphere in mobile phone activities. Development of technology enabled realization of almost computer-like environment even on a very small device. Such advancement yielded several forms of new high-tech devices such as smartphone and tablet PC, which quickly proliferated. Simultaneously with the diffusion of the mobile devices, mobile applications for those devices also prospered and soon became deeply penetrated in consumers' daily lives. Numerous mobile applications have been released in app stores yielding trillions of cumulative downloads. However, a big majority of the applications are disregarded from consumers. Even after the applications are purchased, they do not survive long in consumers' mobile devices and are soon abandoned. Nevertheless, it is imperative for both app developers and app-store operators to understand consumer behaviors and to develop marketing strategies aiming to make sustainable business by first increasing sales of mobile applications and by also designing surviving strategy for applications. Therefore, this research analyzes consumers' mobile application usage behavior in a frame of substitution/supplementary of application categories and several explanatory variables. Considering that consumers of mobile devices use multiple apps simultaneously, this research adopts multivariate probit models to explain mobile application usage behavior and to derive correlation between categories of applications for observing substitution/supplementary of application use. The research adopts several explanatory variables including sociodemographic data, user experiences of purchased applications that reflect future purchasing behavior of paid applications as well as consumer attitudes toward marketing efforts, variables representing consumer attitudes toward rating of the app and those representing consumer attitudes toward app-store promotion efforts (i.e., top developer badge and editor's choice badge). Results of this study can be explained in hedonic and utilitarian framework. Consumers who use hedonic applications, such as those of game and entertainment-related, are of young age with low education level. However, consumers who are old and have received higher education level prefer utilitarian application category such as life, information etc. There are disputable arguments over whether the users of SNS are hedonic or utilitarian. In our results, consumers who are younger and those with higher education level prefer using SNS category applications, which is in a middle of utilitarian and hedonic results. Also, applications that are directly related to tangible assets, such as banking, stock and mobile shopping, are only negatively related to experience of purchasing of paid app, meaning that consumers who put weights on tangible assets do not prefer buying paid application. Regarding categories, most correlations among categories are significantly positive. This is because someone who spend more time on mobile devices tends to use more applications. Game and entertainment category shows significant and positive correlation; however, there exists significantly negative correlation between game and information, as well as game and e-commerce categories of applications. Meanwhile, categories of game and SNS as well as game and finance have shown no significant correlations. This result clearly shows that mobile application usage behavior is quite clearly distinguishable - that the purpose of using mobile devices are polarized into utilitarian and hedonic purpose. This research proves several arguments that can only be explained by second-hand real data, not by survey data, and offers behavioral explanations of mobile application usage in consumers' perspectives. This research also shows substitution/supplementary patterns of consumer application usage, which then explain consumers' mobile application usage behaviors. However, this research has limitations in some points. Classification of categories itself is disputable, for classification is diverged among several studies. Therefore, there is a possibility of change in results depending on the classification. Lastly, although the data are collected in an individual application level, we reduce its observation into an individual level. Further research will be done to resolve these limitations.

The Separation of Church and State and Religious Policy in Modern Korea (한국의 정교분리와 종교정책)

  • Yoon, Seung Yong
    • The Critical Review of Religion and Culture
    • /
    • no.25
    • /
    • pp.195-241
    • /
    • 2014
  • When the objective of a modern state focuses on securing basic human right of an individual and realizing public good in a state community, the direction of policy on religion of a state can not deviate far away from such objective. Meanwhile, the policy on religion of modern states today mostly takes the church and state separation principle as its basis. The states secure religious freedom and enforce the separation of church and state by differentiating religion and the mundane world and establishing the relation between the two. This study examined the church and state separation principle, which is an important system device of recent age nation-states, and explored the possibility of more active policy on religion. First, the relationship among religion, state and politics was examined from more structural and functional viewpoint. Next, how the separation of church and state principle has become recent age political principle and what was the settlement process of church and state separation in other countries are summarized. At last, the actual situation of church and state separation in Korea, the structural limitation of it and the direction of policy on religion are examined. The application experience of church and state separation principle is quite short in Korean society. In addition, when there is a religious issue, there is the trend of evading the issue unconditionally or responding to it passively. However, the religious culture in Korean society is one of the biggest cultural resources and social assets. Since it has big potential as driving force for the advance of state, it is regretful to leave religion alone as it is. Therefore, this study explored the original limitations of church and state separation principle which are limiting the religious policy of of state and searched for a theoretical basis for the utilization of resources in religious culture as driving force of state by overcoming the limitations. This study examined the situation in Korea by paying attention to how differently the church and state separation principle is being applied in other states, The separation of church and state, which is the basis of policy on religion in Korea, belongs to 'similar separation type' like in Japan; therefore, there is a trend of doctrinaire interpretation or arbitrary interpretation. This study suggests that it is required to overcome this limping state and settle down the church and state separation principle, which fits to Korean society, as a social and cultural practice. It is also suggested that more active policy on religion would be enforced by wider interpretation of church and state separation.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Attitude Confidence and User Resistance for Purchasing Wearable Devices on Virtual Reality: Based on Virtual Reality Headgears (가상현실 웨어러블 기기의 구매 촉진을 위한 태도 자신감과 사용자 저항 태도: 가상현실 헤드기어를 중심으로)

  • Sohn, Bong-Jin;Park, Da-Sul;Choi, Jaewon
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.3
    • /
    • pp.165-183
    • /
    • 2016
  • Over the past decade, there has been a rapid diffusion of technological devices and a rising number of various devices, resulting in an escalation of virtual reality technology. Technological market has rapidly been changed from smartphone to wearable devices based on virtual reality. Virtual reality can make users feel real situation through sensing interaction, voice, motion capture and so on. Facebook.com, Google, Samsung, LG, Sony and so on have investigated developing platform of virtual reality. the pricing of virtual reality devices also had decreased into 30% from their launched period. Thus market infrastructure in virtual reality have rapidly been developed to crease marketplace. However, most consumers recognize that virtual reality is not ease to purchase or use. That could not lead consumers to positive attitude for devices and purchase the related devices in the early market. Through previous studies related to virtual reality, there are few studies focusing on why the devices for virtual reality stayed in early stage in adoption & diffusion context in the market. Almost previous studies considered the reasons of hard adoption for innovative products in the viewpoints of Typology of Innovation Resistance, MIR(Management of Innovation Resistant), UTAUT & UTAUT2. However, product-based antecedents also important to increase user intention to purchase and use products in the technological market. In this study, we focus on user acceptance and resistance for increasing purchase and usage promotions of wearable devices related to virtual reality based on headgear products like Galaxy Gear. Especially, we added a variables like attitude confidence as a dimension for user resistance. The research questions of this study are follows. First, how attitude confidence and innovativeness resistance affect user intention to use? Second, What factors related to content and brand contexts can affect user intention to use? This research collected data from the participants who have experiences using virtual rality headgears aged between 20s to 50s located in South Korea. In order to collect data, this study used a pilot test and through making face-to-face interviews on three specialists, face validity and content validity were evaluated for the questionnaire validity. Cleansing the data, we dropped some outliers and data of irrelevant papers. Totally, 156 responses were used for testing the suggested hypotheses. Through collecting data, demographics and the relationships among variables were analyzed through conducting structural equation modeling by PLS. The data showed that the sex of respondents who have experience using social commerce sites (male=86(55.1%), female=70(44.9%). The ages of respondents are mostly from 20s (74.4%) to 30s (16.7%). 126 respondents (80.8%) have used virtual reality devices. The results of our model estimation are as follows. With the exception of Hypothesis 1 and 7, which deals with the two relationships between brand awareness to attitude confidence, and quality of content to perceived enjoyment, all of our hypotheses were supported. In compliance with our hypotheses, perceived ease of use (H2) and use innovativeness (H3) were supported with its positively influence for the attitude confidence. This finding indicates that the more ease of use and innovativeness for devices increased, the more users' attitude confidence increased. Perceived price (H4), enjoyment (H5), Quantity of contents (H6) significantly increase user resistance. However, perceived price positively affect user innovativeness resistance meanwhile perceived enjoyment and quantity of contents negatively affect user innovativeness resistance. In addition, aesthetic exterior (H6) was also positively associated with perceived price (p<0.01). Also projection quality (H8) can increase perceived enjoyment (p<0.05). Finally, attitude confidence (H10) increased user intention to use virtual reality devices. however user resistance (H11) negatively affect user intention to use virtual reality devices. The findings of this study show that attitude confidence and user innovativeness resistance differently influence customer intention for using virtual reality devices. There are two distinct characteristic of attitude confidence: perceived ease of use and user innovativeness. This study identified the antecedents of different roles of perceived price (aesthetic exterior) and perceived enjoyment (quality of contents & projection quality). The findings indicated that brand awareness and quality of contents for virtual reality is not formed within virtual reality market yet. Therefore, firms should developed brand awareness for their product in the virtual market to increase market share.