• Title/Summary/Keyword: IT Device

Search Result 12,082, Processing Time 0.042 seconds

Three dimensional GPR survey for the exploration of old remains at Buyeo area (부여지역 유적지 발굴을 위한 3차원 GPR 탐사)

  • Kim Jung-Bo;Son Jeong-Sul;Yi Myeong-Jong;Lim Seong-Keun;Cho Seong-Jun;Jeong Ji-Min;Park Sam-Gyu
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.49-69
    • /
    • 2004
  • One of the important roles of geophysical exploration in archeological survey may be to provide the subsurface information for effective and systematic excavations of historical remains. Ground Penetrating Radar (GPA) can give us images of shallow subsurface structure with high resolution and is regarded as a useful and important technology in archeological exploration. Since the buried cultural relics are the three-dimensional (3-D) objects in nature, the 3-D or areal survey is more desirable in archeological exploration. 3-D GPR survey based on the very dense data in principle, however, might need much higher cost and longer time of exploration than the other geophysical methods, thus it could have not been applied to the wide area exploration as one of routine procedures. Therefore, it is important to develop an effective way of 3-D GPR survey. In this study, we applied 3-D GPR method to investigate the possible historical remains of Baekje Kingdom at Gatap-Ri, Buyeo city, prior to the excavation. The principal purpose of the investigation was to provide the subsurface images of high resolution for the excavation of the surveyed area. Besides this, another purpose was to investigate the applicability and effectiveness of the continuous data acquisition system which was newly devised for the archeological investigation. The system consists of two sets of GPR antennas and the precise measurement device tracking the path of GPR antenna movement automatically and continuously Besides this hardware system, we adopted a concept of data acquisition that the data were acquired arbitrary not along the pre-established profile lines, because establishing the many profile lines itself would make the field work much longer, which results in the higher cost of field work. Owing to the newly devised system, we could acquire 3-D GPR data of an wide area over about $17,000 m^2$ as a result of the just two-days field work. Although the 3-D GPR data were gathered randomly not along the pre-established profile lines, we could have the 3-D images with high resolution showing many distinctive anomalies which could be interpreted as old agricultural lands, waterways, and artificial structures or remains. This case history led us to the conclusion that 3-D GPR method can be used easily not only to examine a small anomalous area but also to investigate the wider region of archeological interests. We expect that the 3-D GPR method will be applied as a one of standard exploration procedures to the exploration of historical remains in Korea in the near future.

  • PDF

A study on the temperature inside clothing as fundamental data for development of the heat energy harvesting clothing (인체 전력에너지 수확의류 개발을 위한 의복내 온도 측정의 기초적 고찰)

  • Yang, Jin-Hee;Cho, Hyun-Seung;Park, Sun-Hyung;Lee, Joo-Hyeon
    • Science of Emotion and Sensibility
    • /
    • v.16 no.1
    • /
    • pp.125-132
    • /
    • 2013
  • Recently, the consciousness of energy crisis is rapidly growing and sustainable eco-friendly energy sources are becoming issue. Therefore the portable electronic device requires new energy sources for providing continuous power supply and the power energy harvesting system of the human body that enables the power-harvesting research requests anytime, anywhere. One of the sources for energy harvesting is heat energy, which is the difference in temperature of the body and the surrounding environment. We tried to analyze the temperature difference between the environmental temperature and the temperature inside clothing according to the structure of the closed portion. And we examined the temperature difference between the environmental temperature and the temperature inside clothing according to the material of the clothing. The analysis showed that we have been able to get different results at parts of the body in the temperature inside clothing according to the structure of clothing. In upper torso of the chest and back, the temperature inside clothing of 'closed structure' was higher than the temperature inside clothing of 'opened structure'. In the section of arm and leg, it was reduced the difference of temperature inside clothing between 'closed structure' and 'opened structure'. It was particularly noticeable in the section of leg. The results of analysis of the difference between the environmental temperature and the temperature inside clothing according to the material of the clothing, in both cases of the two materials, 'closed structure' was higher than the 'opened structure' in the difference value between the environmental temperature and the temperature inside clothing. There was a difference according to the material in the section of leg. In this study, we outlined the basic guidelines for developing heat energy harvesting clothing by exploring the structure and material of clothing suitable for the heat energy harvesting.

  • PDF

CT Simulation Technique for Craniospinal Irradiation in Supine Position (전산화단층촬영모의치료장치를 이용한 배와위 두개척수 방사선치료 계획)

  • Lee, Suk;Kim, Yong-Bae;Kwon, Soo-Il;Chu, Sung-Sil;Suh, Chang-Ok
    • Radiation Oncology Journal
    • /
    • v.20 no.2
    • /
    • pp.165-171
    • /
    • 2002
  • Purpose : In order to perform craniospinal irradiation (CSI) in the supine position on patients who are unable to lie in the prone position, a new simulation technique using a CT simulator was developed and its availability was evaluated. Materials and Method : A CT simulator and a 3-D conformal treatment planning system were used to develop CSI in the supine position. The head and neck were immobilized with a thermoplastic mask in the supine position and the entire body was immobilized with a Vac-Loc. A volumetrie image was then obtained using the CT simulator. In order to improve the reproducibility of the patients' setup, datum lines and points were marked on the head and the body. Virtual fluoroscopy was peformed with the removal of visual obstacles such as the treatment table or the immobilization devices. After the virtual simulation, the treatment isocenters of each field were marked on the body and the immobilization devices at the conventional simulation room. Each treatment field was confirmed by comparing the fluoroscopy images with the digitally reconstructed radiography (DRR)/digitally composite radiography (DCR) images from the virtual simulation. The port verification films from the first treatment were also compared with the DRR/DCR images for a geometrical verification. Results : CSI in the supine position was successfully peformed in 9 patients. It required less than 20 minutes to construct the immobilization device and to obtain the whole body volumetric images. This made it possible to not only reduce the patients' inconvenience, but also to eliminate the position change variables during the long conventional simulation process. In addition, by obtaining the CT volumetric image, critical organs, such as the eyeballs and spinal cord, were better defined, and the accuracy of the port designs and shielding was improved. The differences between the DRRs and the portal films were less than 3 mm in the vertebral contour. Conclusion : CSI in the supine position is feasible in patients who cannot lie on prone position, such as pediatric patienta under the age of 4 years, patients with a poor general condition, or patients with a tracheostomy.

The Effects of Sight Alignment Method on Pistol Shooting Records of Security Guard (경호요원 권총사격시 조준선정렬방식과 기록변화와의 관계)

  • Lee, Sang-Chul;Shin, Seung-Cheol
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.367-388
    • /
    • 2007
  • Some of individuals working at various fields of security guard are given the legal right to use a gun to cope with expected risks and crimes. Not only in Korea but also throughout the world, a pistol is being used as a device for the workers of security guard such as the army, the police and intelligence agencies to keep the law and social order. A pistol, which is regarded as the last safety measure of security guard, is easy to carry but, because of its short barrel for high portability, its hit ratio and long-range shooting performance are much lower than ordinary guns. Despite such weak points, a pistol can be a great tool because of its high portability and if the users make steady efforts to improve their skills and, for this reason, it has been being used widely until now. National agency workers' pistol shooting skills depend on several important factors, but for the fast and accurate shooting, the mot important factor is how to aim at the target. Because it takes a relatively longer time to align the sight on the target, the change of the sight alignment method is expected to improve pistol shooting skills a lot. In Korea, however, most of national agency training centers teach the basic aiming method that crosses the foresight and the backsight and aligns the crossing to the target. That is, they teach the sight alignment method for fixed targets. Some agencies in Korea and foreign countries that have used guns more frequently and longer than us are teaching different sight alignment methods as well. Representative ones of them are aiming only with the foresight and pointing shooting. These aiming methods are expected to produce good results against moving targets. While the basic sight alignment method has to cross the foresight and the backsight and then to align the crossing to the target, so takes a longer time than other aiming methods, the other two aiming methods are expected to be effective in fields where both swiftness and accuracy are require. Because domestic agencies are teaching mainly the basic sight alignment method, the present study purposed to examine the effects of different aiming methods on shooting records and ultimately to contribute to national agency workers' operation. For this purpose, we selected 20 policemen from local police commandos under the National Police Agency who were accustomed to pistol shooting and measured their pistol shooting. According to the results, the pointed shooting method showed the best record in 5m short.range shooting. As to hit ratio in 15m shooting, which is relatively long.range for pistol shooting, the basic aiming method showed the best record, but the results of statistical analysis showed that pointed shooting is most superior. Of course, the results were obtained from a group who were used to and skillful in pistol shooting, but they are considered meaningful in that all the police and national agency workers should have such high shooting skills.

  • PDF

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

Study for making movie poster applied Augmented Reality (증강현실 영화포스터 제작연구)

  • Lee, Ki Ho
    • Cartoon and Animation Studies
    • /
    • s.48
    • /
    • pp.359-383
    • /
    • 2017
  • 3,000 years ago, since the first poster of humanity appeared in Egypt, the invention of printing technique and the development of civilization have accelerated the poster production technology. In keeping with this, the expression of poster has also been developed as an attempt to express artistic sensibility in a simple arrangement of characters, and now it has become an art form that has become a domain of professional designers. However, the technological development in the expression of poster is keep staying in two-dimensional, and is dependent on printing only that it is irrelevant to the change of ICT environment based on modern multimedia. Especially, among the many kinds of posters, the style of movie posters, which are the only objects for video, are still printed on paper, and many attempts have been made so far, but the movie industry still does not consider ICT integration at all. This study started with the feature that the object of the movie poster dealt with the video and attempted to introduce the augmented reality to apply the dynamic image of the movie to the static poster. In the graduation work of the media design major of a university in Korea, the poster of each works for promoting the visual work of the students was designed and printed in the form of a commercial film poster. Among them, 6 artworks that are considered to be suitable for augmented reality were selected and augmented reality was introduced and exhibited. Content that appears matched to the poster through the mobile device is reproduced on a poster of a scene of the video, but the text informations of the original poster are kept as they are, so that is able to build a moving poster looked like a wanted from the movie "Harry Potter". In order to produce this augmented reality poster, we applied augmented reality to posters of existing commercial films produced in two different formats, and found a way to increase the characteristics of AR contents. Through this, we were able to understand poster design suitable for AR representation, and technical expression for stable operation of augmented reality can be summarized in the matching process of augmented reality contents production.

Operative treatment for Proximal Humeral Fracture (상완골 근위부 골절의 수술적 요법)

  • Park Jin-Young;Park Hee-Gon
    • Journal of Korean Orthopaedic Sports Medicine
    • /
    • v.2 no.2
    • /
    • pp.168-175
    • /
    • 2003
  • Fracture about proximal humerus may be classified as the articular segment or the anatomical neck, the greater tuberosity, the lesser tuberosity, and the shaft or surgical neck. Now, usually used, Neer's classification is based on the number of segments displaced, over 1cm of displaced or more than 45 degrees of angulation , rather than the number of fracture line . Absolute indication of a operative treatment a open fracture, the fracture with vascular injury or nerve injury , and unreductable fracture-dislocation . Inversely, the case that are severe osteoporosis, and eldly patient who can't be operated by strong internal fixation is better than arthroplasty used by primary prosthetic replacement and early rehabilitation program than open reduction and internal fixation. The operator make a decision for the patient who should be taken the open reduction and internal fixation, because it's different that anatomical morphology, bone density, condition of patient. The operator decide operation procedure. For example, percutaneous pinning, open reduction, plate & screws, wire tension bands combined with some intramedullary device are operation procedure that operator can decide . The poor health condition for other health problem, fracture with unstable vital sign and severe osteoporosis , are the relative contraindication. The stable fracture without dislocation is not the operative indication . The radiologic film of the prokimal humerus before the operation can not predict for fracture evaluation. It's necessary to good radiologic film for evaluation of fracture form. The trauma serise is better than the other radiologic film for evaluation. The accessary radiologic exam is able to help for evaluation of bone fragment and anatomy. The CT can be helpful in evaluating these injury, especially if the extract fracture type cannot be determined from plain roenterogram of the proximal humerus, bone of humerus head. If the dislocation is severe anatomically , we could consider to do three dimentional remodelling. The MRI doing for observing of bony morphology before the operation is not better than CT If we were suspicious of vascular injury, we could consider the angiography.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Evaluation of Temperature and Humidity of a Thermo-Hygrostat of PET/CT Equipment using a Temperature and Humidity Sensor(BME 280) (온·습도센서(BME 280 센서)를 이용한 PET/CT 장비의 항온 항습기 온·습도 평가)

  • Ryu, Chan-Ju;Kim, Jeong-A;Kim, Jun-Su;Yun, Geun-Yeong;Heo, Seung-Hui;Hong, Seong-Jong
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.1
    • /
    • pp.15-22
    • /
    • 2020
  • PET(Positron Emission Tomography) devices are used as PET/CT or PET/MRI devices fused with the devices of CT or MRI for obtaining anatomical information. Therefore, the devices are constructed in circular ring-type structure whose length of gantry(the main part of filming) becomes wider and the interior depth becomes longer in comparison to other common medical equipments. scintillator, one of the components in PET devices, is inside the gantry, and as it is consisted of crystal which is sensitive to the change of temperature and humidity, large temperature change can cause the scintillator to be damaged. Though scintillator located inside the gantry maintains temperature and humidity with a thermo-hygrostat, changes in temperature and humidity are expected due to structural reasons. The output value was measured by dividing the inside of the gantry of the PET/CT device into six zones, each of which an Adafruit BME 280 temperature and humidity sensor was placed at. A thermo-hygrostat keeps the temperature and humidity constant in the PET/CT room. As the measured value of temperature and humidity of the sensor was obtained, the measured value of temperature and humidity appeared in the thermohygrostat was taken at the same time. Comparing the average measured values of temperature and humidity measured at each six zones with the average values of the thermo-hygrostat results in a difference of 2.71℃ in temperature and 21.5% in humidity. The measured temperature and humidity of PET Gantry is out of domestic quality control range. According to the results of the study, if there is continuous change in temperature and humidity in the future, the aging of the scintillator mounted in the PET Gantry is expected to be aging, so it is necessary to find a way to properly maintain the temperature and humidity inside the Gantry structure.

A Study for Factors Influencing the Usage Increase and Decrease of Mobile Data Service: Based on The Two Factor Theory (모바일 데이터 서비스 사용량 증감에 영향을 미치는 요인들에 관한 연구: 이요인 이론(Two Factor Theory)을 바탕으로)

  • Lee, Sang-Hoon;Kim, Il-Kyung;Lee, Ho-Geun;Park, Hyun-Jee
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.97-122
    • /
    • 2007
  • Conventional networking and telecommunications infrastructure characterized by wires, fixed location, and inflexibility is giving way to mobile technologies. Numerous research reports point to the ultimate domination of wireless communication. With the increasing prevalence of advanced cell-phones, various mobile data services (hereafter MDS) are gaining popularity. Although cellular networks were originally introduced for voice communications, statistics indicate that data services are replacing the matured voice service as the growth engine for telecom service providers. For example, SK Telecom, the Korea's largest mobile service provider, reported that 25.6% of revenue and 28.5% of profit came from MDS in 2006 and the share is growing. Statistics also indicate that, in 2006, the average revenue per user (ARPU) for voice didn't change but MDS grew seven percents from the previous year, further highlighting its growth potential. MDS is defined "as an assortment of digital data services that can be accessed using a mobile device over a wide geographic area." A variety of MDS have been deployed, with a few reaching the status of killer applications. Many of them need to access the Internet through the cellular-phone infrastructure. In the past, when the cellular network didn't have acceptable bandwidth for data services, SMS (short messaging service) dominated MDS. Now, Internet-ready, next-generation cell-phones are driving rich digital data services into the fabric of everyday life, These include news on various topics, Internet search, mapping and location-based information, mobile banking and gaming, downloading (i.e., screen savers), multimedia streaming, and various communication services (i.e., email, short messaging, messenger, and chaffing). The huge economic stake MDS has on its stakeholders warrants focused research to understand associated dynamics behind its adoption. Lyytinen and Yoo(2002) pointed out the limitation of traditional adoption models in explaining the rapid diffusion of innovations such as P2P or mobile services. Also, despite the increasing popularity of MDS, unexpected drop in its usage is observed among some people. Intrigued by these observations, an exploratory study was conducted to examine decision factors of MDS usage. Data analysis revealed that the increase and decrease of MDS use was influenced by different forces. The findings of the exploratory study triggered our confirmatory research effort to validate the uni-directionality of studied factors in affecting MDS usage. This differs from extant studies of IS/IT adoption that are largely grounded on the assumption of bi-directionality of explanatory variables in determining the level of dependent variables (i.e., user satisfaction, service usage). The research goal is, therefore, to examine if increase and decrease in the usage of MDS are explained by two separate groups of variables pertaining to information quality and system quality. For this, we investigate following research questions: (1) Does the information quality of MDS increase service usage?; (2) Does the system quality of MDS decrease service usage?; and (3) Does user motivation for subscribing MDS moderate the effect information and system quality have on service usage? The research questions and subsequent analysis are grounded on the two factor theory pioneered by Hertzberg et al(1959). To answer the research questions, in the first, an exploratory study based on 378 survey responses was conducted to learn about important decision factors of MDS usage. It revealed discrepancy between the influencing forces of usage increase and those of usage decrease. Based on the findings from the exploratory study and the two-factor theory, we postulated information quality as the motivator and system quality as the de-motivator (or hygiene) of MDS. Then, a confirmative study was undertaken on their respective role in encouraging and discouraging the usage of mobile data service.