• Title/Summary/Keyword: Research Information Systems

Search Result 12,220, Processing Time 0.039 seconds

Users' Status Quo Bias in the Mobile Application Context : From the Myopic Loss Aversion Perspective (근시안적 손실회피 관점에서 본 모바일 애플리케이션 사용자의 현상유지 편향에 관한 연구)

  • Park, Sang-Cheol
    • The Journal of Information Systems
    • /
    • v.24 no.2
    • /
    • pp.189-208
    • /
    • 2015
  • Purpose While individuals have unique abilities for planned behavior, they also often act irrationally. In this study, we draw on myopic loss aversion perspective as a meta-theoretical lens to explain why mobile applications users have inertia from updating their applications, ultimately leading them to use current version of applications. Design/methodology/approach Based on a survey of 219 users, this study conducts its research model using partial least square analysis and also demonstrates that both subconscious triggers (habit and anxiety) of system 1 thinking and conscious triggers (sunk cost and transition cost) of system 2 thinking promotes user's inertia, thus leading to the willness to continue use current versions. Findings By grounding the research model in the combination of both status quo bias and dual information processing theory from the behavioral economics, this study provide an alternative theoretical lens to describe why mobile users hesitate to update their applications. The results of this research show that all triggers have significant impacts on inertia. This study also found that the relationship between inertia and willingness to continue to use current version was positively significant.

Factors Influencing Adoption of Corporate Web Site Over Time : Innovation Diffusion Theory Perspective (기업의 웹 사이트 채택 시기에 영향을 미치는 요인 - 혁신확산이론 관점에서 -)

  • Lee, Dong-Man;Chang, Myung-Hee;Yoo, Ji-Young
    • Asia pacific journal of information systems
    • /
    • v.13 no.4
    • /
    • pp.257-277
    • /
    • 2003
  • Recently, organizations intend to adopt new information technology for acquiring relative advantages in competitive business environment. Especially, many companies have paid attention to web-based electronic commerce. But research in this area has largely been performed to the operational and technical aspects of web site. Also the World Wide Web(web) has become one of the most widely used information technologies, but research indicates that there are many firm that are still considering whether to establish a web presence. This study examines factors influencing adoption of corporate web site over time. To examine why companies adopt web site, this study regards web site as an innovation and finds out these reason through Innovation Diffusion Theory. Independent variables of this research are composed of innovation characteristics, organizational characteristics and environmental characteristics. By the result of logistic regression analysis, we find that there are significant differences between early adopters and late adopters of web site for three adoption factors : top management support, organization size, environmental uncertainty. These findings confirm the theoretical frame for adoption of corporate web site. Also this study will provide good guidelines to the companies and the vendors in shaping the strategies of IT adoption and IT diffusion respectively.

Construction of a Balanced Test Collection for Evaluation of Information Retrieval System (정보 검색 시스템 평가를 위한 균형 테스트 컬렉션 구축)

  • 맹성현;이석훈;이준호;이응봉;송사광
    • Journal of the Korean Society for information Management
    • /
    • v.16 no.2
    • /
    • pp.135-148
    • /
    • 1999
  • There has been some research in Korea on test collections for evaluation of information retrieval (IR) systems. The test collections constructed as an outcome from the research have provided a starting point and opportunities to test Korean IR systems in an objective manner. However, they are well short of the standard practice in the broader IR community in that they are small in their size and usually unbalanced in terms of the characteristics of the documents and the queries (such as the subject domains). In this article, we describe our research effort to alleviate this problem and the resulting test collection, called HANTEC (Hangul TEst Collection). HANTEC is balanced in terms of the subject domains, document lengths, and user types, and currently consists of 120,000 documents divided into three groups: general area, social science area and scienceltechnology area. The 30 queries in the collection are grouped into the same three areas in one dimension and into three distinct user groups in the other dimension.

  • PDF

Downlink Signal Measurement Algorithm for WCDMA/HSPA/HSPA+

  • Kwon, Bit-Na;Lee, Eui-Hak;Hong, Dae-Ki;Kang, Sung-Jin;Kang, Min-Goo;Song, Hyoung-Kyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.3040-3053
    • /
    • 2015
  • Wideband code division multiple access (WCDMA), high speed packet access (HSPA) and HSPA+ are third generation partnership project (3GPP) standards. These systems are the major wireless communication standards. In order to test the performance of WCDMA/HSPA/HSPA+ signal in a base station, the measurement hardware is required to the evaluation of the transmitted signals. In this paper, the algorithm for the performance measurement of the WCDMA/HSPA/HSPA+ is proposed. Also, the performance of the measurement algorithm is used to evaluate the generated signal by the WCDMA/HSPA/HSPA+ signal generator. Generally, the algorithm of normal modems cannot be applied to the measurement system because the signal measurement equipment needs to guarantee the high accuracy. So, the WCDMA/HSPA/HSPA+ signal measurement algorithm for the accurate measurement is proposed. By the simulation, it is confirmed that the proposed measurement algorithm has good performance compared with the specification. Therefore, the proposed algorithm can be usefully applied to verify the performance of the measurement using the simulation.

Constructivist Research in Smart Tourism

  • Hunter, William Cannon;Chung, Namho;Gretzel, Ulrike;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.25 no.1
    • /
    • pp.103-118
    • /
    • 2015
  • Smart tourism is a social phenomenon arising from the convergence of information technology with the tourism experience. New ways of doing business, new patterns of experience and new problems concerning tourism destination image management and marketing are emerging due to the ubiquitous presence and influence of the internet and mobile devices. New conceptual tools are also available to enable researchers to further understand the social implications as well as the practical implementation of these new virtual and augmented smart tourism ecosystems. To this effect this paper introduces the constructivist paradigm and associated research methodologies as another toolbox for interpreting how smart tourism works as a form of soft power. The implications revealed by constructivism are that through smart tourism ecosystems, destination commodification and commoditization, experience and image formation are increasingly self-perpetuating, autonomous and organic social constructions. Researchers in information technology can use constructivist research to further explore these dynamic developments in smart tourism.

Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network

  • Aloufi, Hanouf;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.194-202
    • /
    • 2022
  • The use of public Wi-Fi has increased in recent years with many people like to spend their time outside in malls or café shops which provide public Wi-Fi for their customers. However, since the public Wi-Fi can be accessed from any device the security of public Wi-Fi plays a big role to prevent the stealing of information by an attacker with methods and techniques such as WPA, WPA2 and WPA3. However, it is well known to the attackers that these methods are not difficult to get hacked by the attacker device to take the client precious information. Some researches were done in increasing the security of public Wi-Fi each with their own different technique or algorithm to provide more secure connection to the public Wi-Fi and prevent any unauthorized user to connect to avoid stealing the data of another legal user. Theses research paper are evaluated to learn which method excel in protecting the public Wi-Fi security by giving an analysis to the methods provided by the research paper with comparing the pros and cons of each algorithm. Moreover, the research displays that there are methods to actually provide security to the public Wi-Fi with each being very different in implementation.

Machine Learning-based Prediction of Relative Regional Air Volume Change from Healthy Human Lung CTs

  • Eunchan Kim;YongHyun Lee;Jiwoong Choi;Byungjoon Yoo;Kum Ju Chae;Chang Hyun Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.576-590
    • /
    • 2023
  • Machine learning is widely used in various academic fields, and recently it has been actively applied in the medical research. In the medical field, machine learning is used in a variety of ways, such as speeding up diagnosis, discovering new biomarkers, or discovering latent traits of a disease. In the respiratory field, a relative regional air volume change (RRAVC) map based on quantitative inspiratory and expiratory computed tomography (CT) imaging can be used as a useful functional imaging biomarker for characterizing regional ventilation. In this study, we seek to predict RRAVC using various regular machine learning models such as extreme gradient boosting (XGBoost), light gradient boosting machine (LightGBM), and multi-layer perceptron (MLP). We experimentally show that MLP performs best, followed by XGBoost. We also propose several relative coordinate systems to minimize intersubjective variability. We confirm a significant experimental performance improvement when we apply a subject's relative proportion coordinates over conventional absolute coordinates.

An Empirical Study on the Factors Affecting the Intention to Use M2E Services

  • Sang Hoon Lee;Min-Ju Kim;Su-Yeon Kim
    • Asia pacific journal of information systems
    • /
    • v.33 no.3
    • /
    • pp.792-811
    • /
    • 2023
  • Recently, Web 3.0 services such as virtual currency, block chain, and NFT are attracting public attention. Users who depended on platforms are moving away from being dependent on service providers and moving to Web 3.0 services. Representative services of Web 3.0 include P2E (Play to Earn) and M2E (Move to Earn). In the case of P2E, various studies have been conducted as it is widely covered in the press and media, but research on M2E is relatively lacking. This study attempts to identify the intention to use M2E by using the expanded technology acceptance model. External factors were selected based on M2E's own characteristics and personal characteristics, a research model was designed, and the proposed hypotheses were verified through factor analysis and goodness of model fit. As a result of the study, it was confirmed that profitability, innovativeness, and self-expression had a positive effect on perceived characteristics, and that perceived usefulness, perceived enjoyment, and social influence had a positive effect on intention to use. Through the research results, practical implications for efficient service operation that meets the needs of users are presented to M2E platform providers.

The Evaluation of Information System Success Factors In Health Center (보건소 정보시스템의 평가에 관한 실증적 연구)

  • Kim, Mee
    • Health Policy and Management
    • /
    • v.10 no.2
    • /
    • pp.78-102
    • /
    • 2000
  • Factors influencing the success or failure of information systems9IS) have been discussed in many literes. However, little thertical development or empirical research has examined effectiveness of information systems in health center. This study evaluates several model that contribute to IS success in bealth center. In this study, we propose a process model that exhibits several variables influence one after another. These can be classified into six different dimensions. These inclube system aspect, invidual effect. The system aspect is classified by system quality, information quality and service quality. On individual and organizational aspect, this study uses computer self-efficacy and support of top management. The results of this study are as follows: according to multiple regression analysis of user satisfaction, information quality and support of top management are statistically significant influence on user satisfaction. System quality and service quality are a partially significant influence on user satisfaction. Hypothesis 5, proposing that computer self-efficacy would relate positively to user satisfaction, ws not supported by the questionnaire results. Based on these results, information quality and support of top management are very important variables for IS success.

  • PDF

Radio environment maps: The survey of construction methods

  • Pesko, Marko;Javornik, Tomaz;Kosir, Andrej;Stular, Mitja;Mohorcic, Mihael
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3789-3809
    • /
    • 2014
  • Radio environment maps (REMs) and geolocation database represent an important source of information for the operation of cognitive radio networks, replacing or complementing spectrum sensing information. This paper provides a survey of methods for constructing the radio frequency layer of radio environment map (RF-REM) using distributed measurements of the signal levels at a given frequency in space and time. The signal level measurements can be obtained from fixed or mobile devices capable of sensing radio environment and sending this information to the REM. The signal measurements are complemented with information already stored in different REM content layers. The combined information is applied for estimation of the RF-REM layer. The RF-REM construction methods are compared, and their advantages and disadvantages with respect to the spatial distribution of signal measurements and computational complexity is given. This survey also indicates possible directions of further research in indirect RF-REM construction methods. It emphasizes that accurate RF-REM construction methods should in the best case support operation with random and clustered signal measurements, their operation should not be affected by measurements outliers, and it must estimate signal levels comparably on all RF-REM locations with moderate computational effort.