• 제목/요약/키워드: ITS device

검색결과 3,973건 처리시간 0.031초

Design Evaluation Model Based on Consumer Values: Three-step Approach from Product Attributes, Perceived Attributes, to Consumer Values (소비자 가치기반 디자인 평가 모형: 제품 속성, 인지 속성, 소비자 가치의 3단계 접근)

  • Kim, Keon-Woo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • 제23권4호
    • /
    • pp.57-76
    • /
    • 2017
  • Recently, consumer needs are diversifying as information technologies are evolving rapidly. A lot of IT devices such as smart phones and tablet PCs are launching following the trend of information technology. While IT devices focused on the technical advance and improvement a few years ago, the situation is changed now. There is no difference in functional aspects, so companies are trying to differentiate IT devices in terms of appearance design. Consumers also consider design as being a more important factor in the decision-making of smart phones. Smart phones have become a fashion items, revealing consumers' own characteristics and personality. As the design and appearance of the smartphone become important things, it is necessary to examine consumer values from the design and appearance of IT devices. Furthermore, it is crucial to clarify the mechanisms of consumers' design evaluation and develop the design evaluation model based on the mechanism. Since the influence of design gets continuously strong, various and many studies related to design were carried out. These studies can classify three main streams. The first stream focuses on the role of design from the perspective of marketing and communication. The second one is the studies to find out an effective and appealing design from the perspective of industrial design. The last one is to examine the consumer values created by a product design, which means consumers' perception or feeling when they look and feel it. These numerous studies somewhat have dealt with consumer values, but they do not include product attributes, or do not cover the whole process and mechanism from product attributes to consumer values. In this study, we try to develop the holistic design evaluation model based on consumer values based on three-step approach from product attributes, perceived attributes, to consumer values. Product attributes means the real and physical characteristics each smart phone has. They consist of bezel, length, width, thickness, weight and curvature. Perceived attributes are derived from consumers' perception on product attributes. We consider perceived size of device, perceived size of display, perceived thickness, perceived weight, perceived bezel (top - bottom / left - right side), perceived curvature of edge, perceived curvature of back side, gap of each part, perceived gloss and perceived screen ratio. They are factorized into six clusters named as 'Size,' 'Slimness,' 'No-Frame,' 'Roundness,' 'Screen Ratio,' and 'Looseness.' We conducted qualitative research to find out consumer values, which are categorized into two: look and feel values. We identified the values named as 'Silhouette,' 'Neatness,' 'Attractiveness,' 'Polishing,' 'Innovativeness,' 'Professionalism,' 'Intellectualness,' 'Individuality,' and 'Distinctiveness' in terms of look values. Also, we identifies 'Stability,' 'Comfortableness,' 'Grip,' 'Solidity,' 'Non-fragility,' and 'Smoothness' in terms of feel values. They are factorized into five key values: 'Sleek Value,' 'Professional Value,' 'Unique Value,' 'Comfortable Value,' and 'Solid Value.' Finally, we developed the holistic design evaluation model by analyzing each relationship from product attributes, perceived attributes, to consumer values. This study has several theoretical and practical contributions. First, we found consumer values in terms of design evaluation and implicit chain relationship from the objective and physical characteristics to the subjective and mental evaluation. That is, the model explains the mechanism of design evaluation in consumer minds. Second, we suggest a general design evaluation process from product attributes, perceived attributes to consumer values. It is an adaptable methodology not only smart phone but also other IT products. Practically, this model can support the decision-making when companies initiative new product development. It can help product designers focus on their capacities with limited resources. Moreover, if its model combined with machine learning collecting consumers' purchasing data, most preferred values, sales data, etc., it will be able to evolve intelligent design decision support system.

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • 제22권4호
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

Laboratory-scale fruiting body formation of Pleurotus ostreatus using the petri dish culture (느타리의 기내 자실체 형성 및 그 유도조건에 관한 연구)

  • Joh, Joong-Ho;Chu, Kyo-Sun;Kim, Beom-Gi;Kong, Won-Sik;Yoo, Young-Bok;Lee, Seung-Jae;Cho, Bong-Gum;Lee, Chang-Soo
    • Journal of Mushroom
    • /
    • 제2권1호
    • /
    • pp.15-20
    • /
    • 2004
  • Pleurotus ostreatus, the oyster mushroom, is one of the most widely cultivated and important edible mushrooms in the world. In order to study the developmental process of P. ostreatus and its regulatory mechanism, a new culturing method needs to be established for inducing the fruiting body and sporulation in the laboratory. In this study, we have examined whether the fruiting body of P. ostreatus can be formed on the plastic petri dish which are commonly used for cell culture in the laboratory. The strain was cultured on $60{\times}15mm$ plastic petri dish with potato dextrose agar media at $28^{\circ}C$ for mycelial growth and then at $18^{\circ}C$ for the formation of primordia and fruiting bodies within plant growth chamber. The development of primordia into fruiting bodies was achieved on cultured dishes under air ventilation. At the primordia stage, the normal formation of fruiting body was blocked by sealing the plastic dish with parafilm. The periods requiring for the formation of primordia and fruiting bodies were examined on the dish culture. About 96% and 76% of cultured samples formed primordia and fruiting bodies under the optimal conditions during ten weeks of culture, respectively. These culturing periods, however, were changed by the mechanical injury treatment to mycelia. As other factors affecting the fruiting body formation, the effects of light and cold shock have been tested. No fruiting formation was observed on the cultured dishes under the dark. The cold shock treatment by storing cultured dishes for one day at $4^{\circ}C$ did not have any significant effects in the fruiting body formation. Spores of fruiting bodies acquired from the petri dishes could be germinated on culture media at $28^{\circ}C$. These results suggest that the fruiting bodies of P. ostreatus can be formed on the experimental petri dish and this dish-culturing method is useful for understanding of the developmental process of P. ostreatus in the laboratory. Furthermore, the dish-culturing method is able to shorten the life cycle of P. ostreatus without requiring large area and expensive device.

  • PDF

A standardized procedure on building spectral library for hazardous chemicals mixed in river flow using hyperspectral image (초분광 영상을 활용한 하천수 혼합 유해화학물질 표준 분광라이브러리 구축 방안)

  • Gwon, Yeonghwa;Kim, Dongsu;You, Hojun
    • Journal of Korea Water Resources Association
    • /
    • 제53권10호
    • /
    • pp.845-859
    • /
    • 2020
  • Climate change and recent heat waves have drawn public attention toward other environmental issues, such as water pollution in the form of algal blooms, chemical leaks, and oil spills. Water pollution by the leakage of chemicals may severely affect human health as well as contaminate the air, water, and soil and cause discoloration or death of crops that come in contact with these chemicals. Chemicals that may spill into water streams are often colorless and water-soluble, which makes it difficult to determine whether the water is polluted using the naked eye. When a chemical spill occurs, it is usually detected through a simple contact detection device by installing sensors at locations where leakage is likely to occur. The drawback with the approach using contact detection sensors is that it relies heavily on the skill of field workers. Moreover, these sensors are installed at a limited number of locations, so spill detection is not possible in areas where they are not installed. Recently hyperspectral images have been used to identify land cover and vegetation and to determine water quality by analyzing the inherent spectral characteristics of these materials. While hyperspectral sensors can potentially be used to detect chemical substances, there is currently a lack of research on the detection of chemicals in water streams using hyperspectral sensors. Therefore, this study utilized remote sensing techniques and the latest sensor technology to overcome the limitations of contact detection technology in detecting the leakage of hazardous chemical into aquatic systems. In this study, we aimed to determine whether 18 types of hazardous chemicals could be individually classified using hyperspectral image. To this end, we obtained hyperspectral images of each chemical to establish a spectral library. We expect that future studies will expand the spectral library database for hazardous chemicals and that verification of its application in water streams will be conducted so that it can be applied to real-time monitoring to facilitate rapid detection and response when a chemical spill has occurred.

A Study on the Culture of Incense in the Period of T'ang (당대 향문화 연구)

  • Chun Hea-Sook;Lee Ae-Ryun
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • 제7권3호
    • /
    • pp.113-127
    • /
    • 2005
  • From the ancient times, incense was used for various usages including a means of beauty expression with flavor, a medicine for disease treatment and a device for religious event or ritual. The period of T'ang was the times when cultural and material exchanges with foreign countries were very actively made under the political openness of the Chinese nation. Here the exchanges were made mainly through inland trade, called Silk Road(絲綢之路) and marine trade routes, Incense Road(香料之路). This indicates that incense was one of the main items actively traded at that time. In addition, literatures of the T'ang period show that in the Chinese nation, a wide range of classes from the imperial family to the public used incense for many different purposes. This suggests that the culture of incense was deeply prevailed and very socially significant in T'ang. This study investigated social factors that promoted the incense culture of T'ang and the applications and types of incense widely used in the period of T'ang. First, influential religions and the openness of sex culture were main social factors that made incense culture flourish in the period of T'ang. Above all, two main religions of the Chinese nation, Buddhism and Taoism became secularized under political protection by the imperial family. As Buddhism was popularized, the Buddhist ritual of incense burning made a contribution to making public incense culture. Providing its doctrines of eternal youth and eternal life, Taoism necessarily used incense to form a Taoistic climate. The flourishment of the foresaid religion in T'ang added more fuel to that of incense culture in the Chinese nation. The openness of sex culture brought about the Inauguration of the empress, improvement in female position and free relationships between man and woman. It was accelerated by sexology as a method of eternal youth provided by Taoism. The opened culture also developed the culture of kibang where female entertainers called kinyeo consumed lots of incense for decoration and sexual desire stimulation. These open climates of T'ang society made a great contribution to making incense culture, especially for decoration, prevailed throughout the Chinese nation. Second, types of incense prevailed and widely used in the period of T'ang included olive incense, germander(廣藿香), olibnum(乳香), myrrh Resinoid(沒藥), jia Xiang(甲香), clove(丁香) and Shen xian(沈香), all of which were imported from foreign nations and had various applications. Specifically, olive incense, germander(廣藿香), olibnum(乳香) and myrrh Resinoid(沒藥) were used for religious purposes while, jia Xiang(甲香), clove(丁香) and Shen xian(沈香) for the purposes of religion and decoration. In conclusion, a number of social factors including political, religious and medical purposes and the openness of sex culture set fundamentals on which the culture of incense was extensively developed and established as a social trend in T'ang. In the Chinese nation, incense culture was not just an option for taste, but a part of life style social members needed to know. People of T'ang not only enjoyed incense mainly for purposes of religion, pleasure and make-up, but also had the wisdom to know various effects of incense, curiosity about such new things and the will to imitate and pursue alien culture, resultantly flourishing incense culture. Thus the culture of incense represented many social aspects of T'ang.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • 제39호
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Evaluation of a Serodiagnostic Method for Tuberculosis by Using Secreted Protein Antigens of Mycobacterium Tuberculosis (결핵균 분비항원을 이용한 결핵의 혈청학적 진단 방법에 대한 평가)

  • Bai, Gill-Han;Park, Eun-Mi;Kim, Sang-Jae
    • Tuberculosis and Respiratory Diseases
    • /
    • 제48권3호
    • /
    • pp.315-323
    • /
    • 2000
  • Background : An immunochromatographic assay (ICT Diagnostics) which facilitates the diagnosis of tuberculosis(TB) by detecting serum antibodies mainly directed against specific 38KDa of Mycobacterium tuberculosis has come into the market. The test consists of a cardboard folding device containing nitrocellulose strip and absorbent pads. The whole procedure is completed within 15 min and does not require any additional equipment. The test has been reported to be sensitive and specific in diagnosing active TB. Thus the test had been evaluated with sera from TB patients and TB-free subjects. Method : Sera from patients with active pulmonary tuberculosis(40 sputum positives for Mycobacterium tuberculosis, 79 sputum negatives, and 3 extrapulmonary tuberculosis) were obtained from the Double-Cross Chest Clinic of the Korean National Tuberculosis Association (KNTA) in Seoul. The control group consisted of TB-free 68 subjects(21 children under 7 years old and 47 healthy staff members of KNTA). Results : Nine out of 68(13.2%) TB-free controls had positive antibody response. Total 106 of 122(86.9%) radiologically active patients had positive antibodies while 16 (13.1%) showed negative reaction. Antibody was detected in 38 of 40(95.0%) sputum positive patients and 68 of 82(82.9%) sputum negative patients who were under the antituberculosis chemotherapy. The sensitivity and specificity were all 87% and the positive predictive value was 92.2% while the negative predictive value was 78.7%, when the prevalence of TB in the sample was 64.2%. Our results clearly show that the detection of antibodies which mainly react with the 38KDa antigen of M. tuberculosis is not suitable as the first-line method of diagnosis but considered only as an adjunctive test to standard techniques of tuberculosis diagnosis. when considering its high false positivity.

  • PDF

Estimating Precise Spatio-Temporal Distribution of Weather Condition Using Semi-Variogram in Small Scale Recreation Forest (Semi-Variogram을 이용한 소규모 자연휴양림 내기상조건의 정밀 시공간 분포 추정)

  • LIM, Chul-Hee;RYU, Dong-Hoon;SONG, Chol-Ho;ZHU, Yong-Yan;LEE, Woo-Kyun;KIM, Min-Seon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • 제18권3호
    • /
    • pp.63-75
    • /
    • 2015
  • As forest therapy is getting more attention than ever, it is important to organize time for activity and location based on spatio-temporal distribution of weather condition in forest. This study aimed to analyze precise spatio-temporal distribution of weather condition by installing long-term weather monitoring device in Yonghyun national natural recreation forest and using acquired weather data in order to support forest recreation and therapy activity. First, we statistically compared 4 models of semi-variogram and the results were all similar. We selected and analyzed the circular model for this study because it was presumed to be the best model for this case. We derived 128 results from the circular model and through semi-variogram, we identified seasonal and temporal distributions of temperature and humidity. Then, we used boxplot, made of partial sill level, to identify significant differences in seasonal and temporal distributions. As a result, in spring and early morning, both temperature and humidity showed equalized result. On the other hand, in summer and early afternoon, both temperature and humidity showed uneven result. In spring and early morning, changes in weather condition are shown little from spatial shifting, it is ideal to perform recreational activities and forest therapy but in summer and early afternoon, it is unadvisable to do so as the changes in weather condition could be harmful unless any other means of preparations are made. This study proposes its significance by analyzing seasonal micro-weather of single recreation forest and presenting seasonal and temporal outcomes.

A Study on Intuitive IoT Interface System using 3D Depth Camera (3D 깊이 카메라를 활용한 직관적인 사물인터넷 인터페이스 시스템에 관한 연구)

  • Park, Jongsub;Hong, June Seok;Kim, Wooju
    • The Journal of Society for e-Business Studies
    • /
    • 제22권2호
    • /
    • pp.137-152
    • /
    • 2017
  • The decline in the price of IT devices and the development of the Internet have created a new field called Internet of Things (IoT). IoT, which creates new services by connecting all the objects that are in everyday life to the Internet, is pioneering new forms of business that have not been seen before in combination with Big Data. The prospect of IoT can be said to be unlimited in its utilization. In addition, studies of standardization organizations for smooth connection of these IoT devices are also active. However, there is a part of this study that we overlook. In order to control IoT equipment or acquire information, it is necessary to separately develop interworking issues (IP address, Wi-Fi, Bluetooth, NFC, etc.) and related application software or apps. In order to solve these problems, existing research methods have been conducted on augmented reality using GPS or markers. However, there is a disadvantage in that a separate marker is required and the marker is recognized only in the vicinity. In addition, in the case of a study using a GPS address using a 2D-based camera, it was difficult to implement an active interface because the distance to the target device could not be recognized. In this study, we use 3D Depth recognition camera to be installed on smartphone and calculate the space coordinates automatically by linking the distance measurement and the sensor information of the mobile phone without a separate marker. Coordination inquiry finds equipment of IoT and enables information acquisition and control of corresponding IoT equipment. Therefore, from the user's point of view, it is possible to reduce the burden on the problem of interworking of the IoT equipment and the installation of the app. Furthermore, if this technology is used in the field of public services and smart glasses, it will reduce duplication of investment in software development and increase in public services.

Determinants of Mobile Application Use: A Study Focused on the Correlation between Application Categories (모바일 앱 사용에 영향을 미치는 요인에 관한 연구: 앱 카테고리 간 상관관계를 중심으로)

  • Park, Sangkyu;Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • 제22권4호
    • /
    • pp.157-176
    • /
    • 2016
  • For a long time, mobile phone had a sole function of communication. Recently however, abrupt innovations in technology allowed extension of the sphere in mobile phone activities. Development of technology enabled realization of almost computer-like environment even on a very small device. Such advancement yielded several forms of new high-tech devices such as smartphone and tablet PC, which quickly proliferated. Simultaneously with the diffusion of the mobile devices, mobile applications for those devices also prospered and soon became deeply penetrated in consumers' daily lives. Numerous mobile applications have been released in app stores yielding trillions of cumulative downloads. However, a big majority of the applications are disregarded from consumers. Even after the applications are purchased, they do not survive long in consumers' mobile devices and are soon abandoned. Nevertheless, it is imperative for both app developers and app-store operators to understand consumer behaviors and to develop marketing strategies aiming to make sustainable business by first increasing sales of mobile applications and by also designing surviving strategy for applications. Therefore, this research analyzes consumers' mobile application usage behavior in a frame of substitution/supplementary of application categories and several explanatory variables. Considering that consumers of mobile devices use multiple apps simultaneously, this research adopts multivariate probit models to explain mobile application usage behavior and to derive correlation between categories of applications for observing substitution/supplementary of application use. The research adopts several explanatory variables including sociodemographic data, user experiences of purchased applications that reflect future purchasing behavior of paid applications as well as consumer attitudes toward marketing efforts, variables representing consumer attitudes toward rating of the app and those representing consumer attitudes toward app-store promotion efforts (i.e., top developer badge and editor's choice badge). Results of this study can be explained in hedonic and utilitarian framework. Consumers who use hedonic applications, such as those of game and entertainment-related, are of young age with low education level. However, consumers who are old and have received higher education level prefer utilitarian application category such as life, information etc. There are disputable arguments over whether the users of SNS are hedonic or utilitarian. In our results, consumers who are younger and those with higher education level prefer using SNS category applications, which is in a middle of utilitarian and hedonic results. Also, applications that are directly related to tangible assets, such as banking, stock and mobile shopping, are only negatively related to experience of purchasing of paid app, meaning that consumers who put weights on tangible assets do not prefer buying paid application. Regarding categories, most correlations among categories are significantly positive. This is because someone who spend more time on mobile devices tends to use more applications. Game and entertainment category shows significant and positive correlation; however, there exists significantly negative correlation between game and information, as well as game and e-commerce categories of applications. Meanwhile, categories of game and SNS as well as game and finance have shown no significant correlations. This result clearly shows that mobile application usage behavior is quite clearly distinguishable - that the purpose of using mobile devices are polarized into utilitarian and hedonic purpose. This research proves several arguments that can only be explained by second-hand real data, not by survey data, and offers behavioral explanations of mobile application usage in consumers' perspectives. This research also shows substitution/supplementary patterns of consumer application usage, which then explain consumers' mobile application usage behaviors. However, this research has limitations in some points. Classification of categories itself is disputable, for classification is diverged among several studies. Therefore, there is a possibility of change in results depending on the classification. Lastly, although the data are collected in an individual application level, we reduce its observation into an individual level. Further research will be done to resolve these limitations.