• Title/Summary/Keyword: Potential User

Search Result 775, Processing Time 0.023 seconds

Identifying Factors Affecting Behavioral Intent of Potential and Existing N-screen Service Users

  • Kwon, Bo-Ram;Ryu, Sunghan;Kim, Young-Gul
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.417-427
    • /
    • 2015
  • With recent advances in media technology, the creation of a relatively new service, N-screen, has been realized. N-screen provides seamless connections among various media and enables users to enjoy entertainment content at any time and any location. With such recent advances comes opportunity; therefore, for those N-screen service providers who have established an early edge in the ICT industry, it is imperative that they maintain this and stay ahead of the ensuing competition. In this context, the objective of this study is two-fold; first, we aim to find factors influencing the behavior of existing and potential N-screen service users, and then second, to examine the differences in how these factors operate within the two user types. The results of this study show that the perceived value and subjective norm are important influencers in both user types. However, price fairness and innovativeness are only influential on the attitude and intention of potential users, while some aspects of media usage have only significant influences on the behavior and loyalty of existing users. Based on these results, we provide some implications for both researchers and practitioners who wish to better understand the nature of N-screen users.

Dynamic Adaptive Model for WebMedia Educational Systems based on Discrete Probability Techniques (이산 확률 기법에 기반한 웹미디어 교육 시스템을 위한 동적 적응 모델)

  • Lee, Yoon-Soo
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.9
    • /
    • pp.921-928
    • /
    • 2004
  • This paper proposed dynamic adaptive model based on discrete probability distribution function and user profile in web based HyperMedia educational systems. This modelsrepresents application domain to weighted direction graph of dynamic adaptive objects andmodeling user actions using dynamically approach method structured on discrete probability function. Proposed probabilitic analysis can use that presenting potential attribute to useractions that are tracing search actions of user in WebMedia structure. This approach methodscan allocate dynamically appropriate profiles to user.

  • PDF

Flexible Integration of Models and Solvers for Intuitive and User-Friendly Model-Solution in Decision Support Systems (의사결정지원시스템에서 직관적이고 사용자 친숙한 모델 해결을 위한 모델과 솔버의 유연한 통합에 대한 연구)

  • Lee Keun-Woo;Huh Soon-Young
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.30 no.1
    • /
    • pp.75-94
    • /
    • 2005
  • Research in the decision sciences has continued to develop a variety of mathematical models as well as software tools supporting corporate decision-making. Yet. in spite of their potential usefulness, the models are little used in real-world decision making since the model solution processes are too complex for ordinary users to get accustomed. This paper proposes an intelligent and flexible model-solver integration framework that enables the user to solve decision problems using multiple models and solvers without having precise knowledge of the model-solution processes. Specifically, for intuitive model-solution, the framework enables a decision support system to suggest the compatible solvers of a model autonomously without direct user intervention and to solve the model by matching the model and solver parameters intelligently without any serious conflicts. Thus, the framework would improve the productivity of institutional model solving tasks by relieving the user from the burden of leaning model and solver semantics requiring considerable time and efforts.

GIROB : Graphic User Interface for Robot Programming (로봇 프로그래밍을 위한 GUI와 CAD의 응용)

  • Kim, J.J.
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.3 no.6
    • /
    • pp.199-211
    • /
    • 1995
  • As international market pressures increase, product life cycles are becoming shorter at same time requirements for productivity and flexibility are becoming higher. Major improvement in robot programming user interface is central to increasing productivity and flexibility for automatic manufacturing environments. New computer technologies have the potential to accomplish this improvement. In this study we have developed a system which proves that interactive computer graphics and geometric modeling have matured to the point where their artful application into an integrated system can rsult in radically new and powerful user interface for robot programming. With the graphic user interface environment the system efficiently utilizes the existing CAD data and gemetric modeling techniques for off-line programming and simulations. Also the system successfully generates robot control programs performing the desired tasks given through off-line programming.

  • PDF

Real-time Intrusion-Detection Parallel System for the Prevention of Anomalous Computer Behaviours (비정상적인 컴퓨터 행위 방지를 위한 실시간 침입 탐지 병렬 시스템에 관한 연구)

  • 유은진;전문석
    • Review of KIISC
    • /
    • v.5 no.2
    • /
    • pp.32-48
    • /
    • 1995
  • Our paper describes an Intrusion Detection Parallel System(IDPS) which detects an anomaly activity corresponding to the actions that interaction between near detection events. IDES uses parallel inductive approaches regarding the problem of real-time anomaly behavior detection on rule-based system. This approach uses sequential rule that describes user's behavior and characteristics dependent on time. and that audits user's activities by using rule base as data base to store user's behavior pattern. When user's activity deviates significantly from expected behavior described in rule base. anomaly behaviors are recorded. Observed behavior is flagged as a potential intrusion if it deviates significantly from the expected behavior or if it triggers a rule in the parallel inductive system.

  • PDF

Analyzing Moderating Effects of WiBro User Experiences

  • Lee, Bong-Gyou;Kim, Ki-Youn;Song, Jae-Sung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.177-190
    • /
    • 2011
  • The purpose of this study is to explore the determinants of actual demand for wireless broadband (WiBro) services in Korea. To this end, this study identifies conceptual definitions of diverse latent variables and determines the significance of the causal relationship between independent and dependent variables. It then presents the nomadic user concept by testing the moderator effect. This study also proposes a revised Unified Theory of Acceptance and Use of Technology (UTAUT) model, which is an appropriate model for wireless communication services and users' attributes. Prior research has concentrated exclusively on the Technology Acceptance Model (TAM) based on future potential users. Compared to previous studies, the current research model and analysis results are useful in not only academic but also industry contexts.

Experience Innovation and Business Strategy : Design for User Experience(UX) in New Product Development(NPD) (경험 혁신과 경영 전략 : 신제품 개발 과정에서의 사용자 경험 디자인(Design for User Experience))

  • Shin, Youngsoo;IM, Chaerin;Lee, Sunwha;Kim, Jinwoo
    • Journal of Information Technology Services
    • /
    • v.14 no.2
    • /
    • pp.231-251
    • /
    • 2015
  • User Experience (UX) and Experience Innovation have been emphasized in the process of New Product Development (NPD). However, previous works which were conducted within the theme of UX mostly focused on the fragmentary aspects of user's experience in a specific usage-context only. For this reason, it is always hard to deal with questions on how to define the abstract concept of UX and how to apply this important keyword in actually NPD process both for satisfying potential users and for setting a market strategy. To address this issue, we focused on the fact that UX has an aspect of composition like pattern and structure. It means that we can understand the context of UX with clarifying characteristics of relations between user and experiential objects. Also, we referred to two sub-concepts of Complexity, Density and Centrality, as representative characteristics of relations in usage-context. Based on this theoretical background, we attempted to find UX design principles and concepts for NPD from the actual example cases of products and services in the real market. From these whole study process, we expect that our findings could have implications for academic and practical areas within the theme of Human-Centered Innovation.

Local Scheduling method based on the User Pattern for Korea@Home Agent (Korea@Home 에이전트를 위한 사용자패턴기반의 로컬 스케줄링기법)

  • Choi, JiHyun;Kim, Mikyoung;Choi, JangWon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.226-230
    • /
    • 2007
  • This paper proposes a local scheduling method based on user pattern for Volunteer computing project, Korea@Home. It enables Korea@Home participants to run the agent without disturbance. It is devised to prevent user's application from delay while running the agent and decreases the frequency of switching resource between the user and the agent. We analyze the user's patterns of donating computing resource with Korea@Home which is a representative volunteer computing project in Korea. It has contributed the computing power to several applications including climate prediction and virtual screening. It promotes the volunteers to participate continuously without disturbance and increases the potential computing power with non-disturbance scheduling based on user usage pattern for Volunteer Computing.

  • PDF

Possibility of Disclosure of User Information in Internet Explorer (인터넷 익스플로러에서 사용자 정보 유출 가능성)

  • Lee, SangHo;Maeng, YoungJae;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.937-943
    • /
    • 2013
  • Internet Explorer is the popular internet browser the most in domestic. In some version of Internet Explorer, user information could be leaked cause CORS(Cross-Origin Resource Sharing) Internet Explorer support. Different before, without setup a malicious program, attacker can get the user information even account information, credit card usage list and user information with SNS or internet portal site logged in regardless of secure program. Not only Internet Explorer but also mobile browser, it could be. In this paper, we make study of the potential disclosure of user information by attack using CORS, second attack and the way to improvement of vulnerability of CORS.

The Effects of Information Security Policies, Security Controls and User's Characteristics on Anti-Virus Security Effectiveness (정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로)

  • Kim Jong-Ki;Jeon Jin-Hwan;Lim Ho-Seob
    • The Journal of Information Systems
    • /
    • v.15 no.1
    • /
    • pp.145-168
    • /
    • 2006
  • Current computer viruses are one of the most serious problems in information age due to their potential demage and impact on use of information systems. To make the problem worse, virus development technology has been advanced rapidly, and use of network systems has expanded widely. Therefore computer viruses are much more complex and use of anti-virus software(AV S/W) is not enough to prrevent virus incidents. It implies that computer viruses as well as other information security matters are not solely a technical problem but also a managerial one. This study emphasized on computer virus controls from managerial perspective of information security and investigated factors influencing the effectiveness of computer virus controls. Organization's comprehensive security policies provide guidelines on how organization or individual can protect themselves from computer viruses. Especially, user's education has positive impact on user's security related characteristics. Based on the analysis of research model using structural equation modeling technique, security policies were influencing security controls and improving user's computer viruses related awareness. Also security controls had positive impact on security effectiveness. However, no significant relationship was found between user's security related characteristics and security effectiveness.

  • PDF