• Title/Summary/Keyword: IT Applications

Search Result 14,746, Processing Time 0.051 seconds

A Study on the Configuration of Pre-install Applications on Smartphone for Customer Needs (고객 중심의 스마트폰 선탑재 앱 구성방안에 관한 연구)

  • Yeon, Bo Huem;Kang, Won Young;Choi, Seong Jhin
    • Journal of Broadcast Engineering
    • /
    • v.24 no.1
    • /
    • pp.105-117
    • /
    • 2019
  • Current Android smartphones include about 25 to 35 essential applications(unerasable) related to function and operation of the android smartphone itself and about 30 optional applications(removable) provided by carriers, Google and manufacturers. These applications were not able to be removed until the announcement of the smartphone applications pre-install guide from the government in January 2014, so there were memory limitations in installing new applications, causing consumer complaints by consuming data during the auto-update process of the pre-installed applications. After the announcement, we were able to delete optional applications but the complaints about the data consumption still did not disappear. Therefore, in this paper, we carried out the customer survey and analyzed the behavior information such as how carriers are operating pre-installed applications and what kind of applications customer prefers and how many applications customer wants to be pre-installed. And we proposed how to configure pre-install applications on smartphone for customer needs.

User Behavior of Mobile Enterprise Applications

  • Lee, Sangmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3972-3985
    • /
    • 2016
  • Organizations have been implementing mobile applications that actually connect to their backend enterprise applications (e.g. ERP, SCM, etc.) in order to increase the enterprise mobility. However, most of the organizations are still struggling to fully satisfy their mobile application users with the enterprise mobility. Even though it has been regarded as the right direction that the traditional enterprise system should move on, the studies on the success model for mobile enterprise applications in user's acceptance perspective can hardly be found. Thus, this study focused not only to redefine the success of the mobile enterprise application in user's acceptance persepective, but also to find the impacts of the factors on user's usage behavior of the mobile enterprise applications. In order to achieve this, we adopted the Technology Acceptance Model 2 (TAM2) as a model to figure out the user's behavior on mobile applications. Among various mobile enterprise applications, this study chose mobile ERP since it is the most representing enterprise applications that many organizations have implemented in their backend. This study found that not all the constructs defined by Davis in TAM2 have a significant influence on user's behavior of the mobile-ERP applications. However, it is also found that most social influence processes of TAM2 influence user's perception of the degree of interaction by mobile-ERP applications.

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

A Study on the Factors of Mobile Applications Adoption (모바일 어플리케이션 수용 요인에 관한 연구)

  • Han, Pil-Koo;Park, Jae-Seok;Jun, Byoung-Ho;Kang, Byung-Goo
    • Journal of Information Technology Services
    • /
    • v.9 no.3
    • /
    • pp.65-82
    • /
    • 2010
  • Mobile applications market has emerged as new business model. The purpose of this study is to analyze the factors of mobile applications adoption. Based on prior studies of TAM and mobile technology/service, service quality, user experience, OS compatibility, self-efficacy, innovativeness, perceived usefulness, perceived ease of use, and cost were identified as affecting factors of mobile applications adoption. According to the results, service quality is significantly related to the perceived usefulness, and self-efficacy and innovativeness are significantly related to the perceived ease of use. User experience was also found to be related to both the perceived usefulness and the perceived ease of use. In case of OS compatibility, it was found to be significantly related to the perceived ease of use, but not to the perceived usefulness. Both the perceived usefulness and the perceived ease of use were found to be related to the adoption of mobile applications. However, cost was not found to be significant to the relationship between the perceived usefulness/the perceived ease of use and the adoption of mobile applications. This study contributes to provide the base of activation strategies and practical implications for mobile applications.

Study on Selection of IT and Smart Sensor Technologies to be Applied to the Next-Generation High-Speed Train (차세대 고속전철에 적용할 IT 및 스마트센서 기술의 선정에 관한 연구)

  • Chang, Duk-Jin;Kang, Song-Hee;Song, Dahl-Ho
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.1977-1987
    • /
    • 2008
  • In this paper, presented was the research work of finding practical application systems using IT that would be adopted by the next generation high speed train for the safety, convenience, and comfort of the passengers and crew members. Study on the applications using smart sensors and IT brought up 26 feasible application cases. Among them 16 cases were related with IT applications and 10 cases smart sensor applications. After having public hearings and surveys to make the decision more objective and generally acceptable, 7 applications - such as information providing service using personal LCD monitor, alarm service, individual internet access service, automatic and remote air conditioning, wireless visual communication with an attendant, extraordinary sound detection, urgent situation in toilet monitoring - out of those 26 were chosen as the final applications.

  • PDF

An Analysis on Key Factors of Mobile Fitness Application by Using Text Mining Techniques : User Experience Perspective (텍스트마이닝 기법을 이용한 모바일 피트니스 애플리케이션 주요 요인 분석 : 사용자 경험 관점)

  • Lee, So-Hyun;Kim, Jinsol;Yoon, Sang-Hyeak;Kim, Hee-Woong
    • Journal of Information Technology Services
    • /
    • v.19 no.3
    • /
    • pp.117-137
    • /
    • 2020
  • The development of information technology leads to changes in various industries. In particular, the health care industry is more influenced so that it is focused on. With the widening of the health care market, the market of smart device based personal health care also draws attention. Since a variety of fitness applications for smartphone based exercise were introduced, more interest has been in the health care industry. But although an amount of use of mobile fitness applications increase, it fails to lead to a sustained use. It is necessary to find and understand what matters for mobile fitness application users. Therefore, this study analyze the reviews of mobile fitness application users, to draw key factors, and thereby to propose detailed strategies for promoting mobile fitness applications. We utilize text mining techniques - LDA topic modeling, term frequency analysis, and keyword extraction - to draw and analyze the issues related to mobile fitness applications. In particular, the key factors drawn by text mining techniques are explained through the concept of user experience. This study is academically meaningful in the point that the key factors of mobile fitness applications are drawn by the user experience based text mining techniques, and practically this study proposes detailed strategies for promoting mobile fitness applications in the health care area.

A Cultural Dimensions Model based on Smart Phone Applications

  • Oh, Jung-Min;Moon, Nam-Mee
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.209-220
    • /
    • 2011
  • One of the major factors influencing the phenomenal growth of the smart phone market is the active development applications based on open environments. Despite difficulties in finding and downloading applications due to the small screens and inconvenient interfaces of smart phones, users download applications nearly every day. Such user behavior patterns indicate the significance of smart phone applications. So far, studies on applications have focused mainly on technical approaches, including recommendation systems. Meanwhile, the issue of culture, as an aspect of user characteristics regarding smart phone use, remains largely unexamined throughout the world. Hence, the present study attempts to analyze the highest ranked smart phone applications downloaded and paid for that are ranked the highest in 10 countries (Korea, Japan, China, India, the UK, USA, Indonesia, Canada, France, and Mexico) and we then derive the CDSC (Cultural Dimensions Score of Content) for these applications. The results derived are, then, mapped to the cultural dimensions model to determine the CISC (Cultural Index Score for Country). Further, culturally significant differences in smart phone environments are identified using MDS analysis.

The Study on the Relationships between IT Investments and Firm's Performance: The Differences According to the Levels of IS Strategic Applications and PEU (제조기업의 정보기술 투자와 기업 성과 간의 관계 연구: 전략적 활용 수준과 환경 불확실성에 따른 차이)

  • Choe, Jong-min
    • The Journal of Information Systems
    • /
    • v.29 no.2
    • /
    • pp.1-26
    • /
    • 2020
  • Purpose This study empirically investigates the impact of information technology(IT) investments on the financial and non-financial performance of a manufacturing firm. We examined the interaction effects of IT investments and strategic applications levels of information systems(IS). This study also demonstrated the three-way interaction effects of IT investments, levels of IS strategic applications, and perceived environmental uncertainty(PEU). Design/methodology/approach For this study, empirical data were collected from 98 manufacturing firms with the structured questionnaires. The data were analyzed with multiple regression models, and partial derivatives were utilized to identify the directions of the impact. Findings From the empirical results, it was found that when both the levels of IS strategic applications and the degrees of IT investments are high, the ratios of the costs of goods sold to total sales(RCGS) and the labor costs to total sales(RLCS) are decreased, as it were, the performance of a firm is improved. However, it was observed that when the levels of strategic IS are low, the high degrees of IT investments do not contribute to the improvement of a performance. The results showed that when the levels of strategic IS are high, the high degrees of IT investments incur the high RSAE not low RSAE. When PEU is considered, the empirical results showed that under the low degrees of PEU, the IT investments under high levels of strategic IS applications (strategic IT investments) improve the performance, as it were, low RCGS, and high degrees of perceived financial and non-financial performance. However, under high PEU, it was observed that high degrees of strategic IT investments do not increase the performance. When PEU is high, the strategic IT investments reduce RSAE, and under low PEU, RSAE is increased.

A Methodology for Developing RFID Applications: RAM (RFID 비즈니스 어플리케이션 개발 방법론: RAM)

  • Ryou, Ok-Hyun;Roh, Seong-Ho;Lee, Jae-Kwang
    • Journal of Information Technology Services
    • /
    • v.5 no.2
    • /
    • pp.199-210
    • /
    • 2006
  • Most of the known RFID applications are derived from RFID technology and its functionalities not business analysis or requirements, so that companies may not obtain real competitive edges by implementing RFID application systems. Developing successful RFID applications is one of the key elements for prevailing RFID use by industries. Research objective is to propose an effective methodology for developing RFID applications based on analyzing business processes. The approach is designed to figure out both technical and business requirements related to RFID applications based on BPR (Business process reengineering) and ISP (Information strategy planning) methodologies. To verify the effectiveness of our approach, we applied the proposed approach to real field cases. As RFID technologies get flourished, the proposed approach is expected to play a meaningful role as an effective tool for developing new RFID applications.

Evaluation on Accuracy of Noise Measurement Applications for iPhone 4 and iPhone 3Gs (아이폰 4 및 아이폰 3Gs의 소음측정 애플리케이션에 대한 정확도 평가)

  • Ma, Hye Ran;Park, Doo Yong
    • Journal of the Korean Society of Safety
    • /
    • v.28 no.1
    • /
    • pp.24-28
    • /
    • 2013
  • This article evaluates the accuracy of noise measurements for 37 noise measurement applications for iPhone 4 and iPhone 3Gs. Noise levels were measured using simultaneously a precision sound level meter and iPhones installed noise measurement applications at the levels of 70 dB, 80 dB and 90 dB at 1,000 Hz. Measurement errors were estimated by subtracting two measurements between iPhone and sound level meter. It was found that measurement errors of 34 applications(89.2%) were greater than ${\pm}2$ dB which is the maximum allowable error range for the Type II sound level meter. It was only 4 applications that measurement errors lie within ${\pm}2$ dB error range. There was no significant differences among measurements with four iPhone 4s. However, there were significant differences between the measurements with iPhone 4 and iPhone 3Gs using the same application. It was due to the different hardware specifications such as microphone. Therefore, noise measurement applications, for example, which has to utilize hardware of the smartphone, should be programmed to identify hardware specifications and to adopt appropriate correction factors upon hardware specifications. In conclusion, it is necessary to check accuracy and validity before using the noise measurement applications for iPhones. Also, it was suggested that it should develop an evaluation guideline or protocol on accuracy testing for the measurement applications using a smartphone.