• Title/Summary/Keyword: International User

Search Result 1,553, Processing Time 0.024 seconds

An Empirical Analysis on the Service Quality and the User Satisfaction in e-Trade Portal Sites (전자무역 포탈사이트의 서비스품질과 이용자만족도에 관한 실증적 연구)

  • Moon, Hee-Cheol;Song, Woo-Yong;Hwang, Kyung-Yun
    • International Commerce and Information Review
    • /
    • v.6 no.1
    • /
    • pp.77-98
    • /
    • 2004
  • This paper examines the major determinants affecting the user satisfaction on e-Trade portal sites in small and medium-sized exporters. The development of our research model is based on the empirical studies on the service quality of information system, web sites or Internet shopping mall, and on the factors influencing the user satisfaction. With the help of a regression analysis and factor analysis, five hypotheses are derived and tested. The results from regression analysis suggest that the user satisfaction of e-Trade portal sites is affected by information characteristics and ease of use of e-Trade portal sites. In addition, the user satisfaction of e-Trade portal sites is enhanced by support for international trade. Our findings will be useful, especially for those who are planning to build user-oriented e-Trade portal sites.

  • PDF

An analysis of the End-User electric power consumption trends using the load curve during international conflict (수용가 부하곡선을 일용한 국제분쟁시 전력사용 행태분석)

  • Son Hak Sig;Kim In Su;Park Yong Uk;Im Sang Kug;Kim Jae Chul
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.165-167
    • /
    • 2004
  • End-user electric power consumption trends shows various load curves dependant on industry, contract, season, day and time. Analysis of end-user electric power consumption trends has a key role to efficiently meet electricity demand. There are several factors of change in electricity demand such as the change of weather, international conflict, and industrial trends during summer. This paper has analyzed the analysis the end-user electric power consumption trends using the load curve during international conflict. We observed that international conflict decreased electric demand by $5.4\%$. This increase is not significant, and therefore we conclude that the international conflict has not greatly affected Korea's electricity demands. This paper provides useful information so as to mon: efficiently perform demand side management.

  • PDF

Construction Of The Measurement Model Of User Satisfaction In Internet Shopping Environment -Based On The End-Use Computng Satisfaction Instrument -

  • Kim, Tae-Hwan
    • International Commerce and Information Review
    • /
    • v.8 no.1
    • /
    • pp.3-13
    • /
    • 2006
  • To develop and validate an instrument to measure user satisfaction in Internet shopping environment, the EUCS instrument by Doll and Torkzadeh (1988) was used for this research. The results of the study shows how the main constructs of the model that will eventually interact for the user satisfaction in internet commerce environment. This research will present significant progress towards keeping the End-User Computing Satisfaction instrument relevant and applicable under the Internet shopping environment.

  • PDF

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

A Study on Factors for the User's Satisfaction of the a-Trade Service System (전자무역서비스 시스템의 사용자 만족 요인에 관한 연구)

  • Shin, Seung-Man;Jeong, Yoon-Say
    • International Commerce and Information Review
    • /
    • v.10 no.3
    • /
    • pp.117-140
    • /
    • 2008
  • The purposes of the study are to measure the relative importance of independent variables, to analyze relation between user satisfaction and use, and to improve the level of user satisfaction in using e-Trade system(uTradeHub). The study develops the independent variables in three dimensions(i.e the quality of system, quality of information, and quality of service), estimates the level of satisfaction on a par with these variables, and analyzes the causal relation of these variables. The major findings of the study are as follows. First, there is a significant casual relationship between the quality of system and user satisfaction, thus the hypothesis is accepted. Second, there is a significant casual relationship between the quality of information and user satisfaction, thus the hypothesis is accepted. Third, there is a significant casual relationship between the quality of service and user satisfaction, thus the hypothesis is accepted. Final, there is a significant casual relationship between the user satisfaction and use, thus the hypothesis is accepted.

  • PDF

User Interface Design & Evaluation of Mobile Applications

  • Samrgandi, Najwa
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.55-63
    • /
    • 2021
  • The design functionality put forward by mapping the interactiveness of information. The presentation of such information with the user interface model indicates that the guidelines, concepts, and workflows form the deliverables and milestones for achieving a visualized design, therefore forming the right trend is significant to ensure compliance in terms of changing consideration and applying evaluation in the early stages. It is evidenced that prototype design is guided by improvement specifications, includes modes, and variables that increase improvements. The study presents five user interface testing methods. The testing methods are heuristic evaluation, perspective-based user interface testing, cognitive walkthrough, pluralistic walkthrough, and formal usability inspection. It appears that the five testing methods can be combined and matched to produce reasonable results. At last, the study presents different mobile application designs for student projects besides the evaluation of mobile application designs to consider the user needs and usability.

Continuous Human Activity Detection Using Multiple Smart Wearable Devices in IoT Environments

  • Alshamrani, Adel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.221-228
    • /
    • 2021
  • Recent improvements on the quality, fidelity and availability of biometric data have led to effective human physical activity detection (HPAD) in real time which adds significant value to applications such as human behavior identification, healthcare monitoring, and user authentication. Current approaches usually use machine-learning techniques for human physical activity recognition based on the data collected from wearable accelerometer sensor from a single wearable smart device on the user. However, collecting data from a single wearable smart device may not provide the complete user activity data as it is usually attached to only single part of the user's body. In addition, in case of the absence of the single sensor, then no data can be collected. Hence, in this paper, a continuous HPAD will be presented to effectively perform user activity detection with mobile service infrastructure using multiple wearable smart devices, namely smartphone and smartwatch placed in various locations on user's body for more accurate HPAD. A case study on a comprehensive dataset of classified human physical activities with our HAPD approach shows substantial improvement in HPAD accuracy.

Analysis on Bit Error Rate Performance of Negatively Asymmetric Binary Pulse Amplitude Modulation Non-Orthogonal Multiple Access in 5G Mobile Networks

  • Chung, Kyuhyuk
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.307-314
    • /
    • 2021
  • Recently, positively asymmetric binary pulse amplitude modulation (2PAM) has been proposed to improve the bit error rate (BER) performance of the weak channel gain user, with a tolerable BER loss of the strong channel gain user, for non-orthogonal multiple access (NOMA). However, the BER loss of the stronger channel gain user is inevitable in such positively asymmetric 2PAM NOMA scheme. Thus, we propose the negatively asymmetric 2PAM NOMA scheme. First, we derive closed-form expressions for the BERs of the negatively asymmetric 2PAM NOMA. Then, simulations demonstrate that for the stronger channel gain user, the BER of the proposed negatively asymmetric 2PAM NOMA improves, compared to that of the conventional positively asymmetric 2PAM NOMA. Moreover, we also show that for the weaker channel gain user, the BER of the proposed negatively asymmetric 2PAM NOMA is comparable to that of the conventional positively asymmetric 2PAM NOMA, over the power allocation range less than about 10 %.

Empirical Analysis of User Information Satisfaction in the SMB Environment (중소기업 정보화 도입을 통한 고객만족도에 관한 연구)

  • Chung, Sung-Taek;Jung, Jin-Taek;Joo, Hyung-Kun;Kwon, Joong-Gil
    • International Commerce and Information Review
    • /
    • v.10 no.3
    • /
    • pp.59-73
    • /
    • 2008
  • The current research utilized as its target population who are current users of global small to medium sized companies in Korea. The research validated the innovative dimensions by studying the two constructs within the context of the SMB user population. Correlation was found between innovative dimensions retained as components of a Comprehensive Model. It was determined that these four dimensions-Content, Intrinsic Interest, Control, and Timeliness-are significant predictors of user success. The Comprehensive Model was validated, and it is therefore suggested as a basis for further study of user success indicators in the innovative manufacturing enterprise environment.

  • PDF

Improved User Privacy in SocialNetworks Based on Hash Function

  • Alrwuili, Kawthar;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.97-104
    • /
    • 2022
  • In recent years, data privacy has become increasingly important. The goal of network cryptography is to protect data while it is being transmitted over the internet or a network. Social media and smartphone apps collect a lot of personal data which if exposed, might be damaging to privacy. As a result, sensitive data is exposed and data is shared without the data owner's consent. Personal Information is one of the concerns in data privacy. Protecting user data and sensitive information is the first step to keeping user data private. Many applications user data can be found on other websites. In this paper, we discuss the issue of privacy and suggest a mechanism for keeping user data hidden in other applications.