• Title/Summary/Keyword: Smartphone User

Search Result 720, Processing Time 0.038 seconds

A Study on the Determinants of Mobile Application Purchase based on User Groups (사용자 유형에 따른 모바일 앱 구매요인에 관한 연구)

  • Oh, Sunju
    • Information Systems Review
    • /
    • v.16 no.1
    • /
    • pp.73-88
    • /
    • 2014
  • According to the widespread use of smartphone, various and abundant mobile applications have been used and lots of new companies have developed mobile applications. To revitalize mobile application market, a lot of research and experiments have been performed in application development and delivery industries. The purpose of this research is to figure out the usage pattern of smartphone application and purchasing criteria of mobile application. We categorized smartphone application users with respect to application selection criteria and examined the characteristics of the categorized users. As a result, the factors of purchasing criteria of the users with respect to smartphone application selection criteria and application type were categorized into 3 groups: aggressive usage group, middle usage group, and passive usage group. The result of this study indicates that the relationship between purchasing criteria and usage pattern in mobile application market was actualized by measuring the purchasing factors of user. Therefore this fact suggests that it is very important to measure the accurate purchasing factors of its user for setting up the marketing strategy of mobile application market.

Generation and Management of Strong Passwords using an Ownership Verified Smartphone (소유권 확인된 스마트폰을 이용한 강력한 패스워드 생성 및 관리)

  • Park, Jun-Cheol
    • Smart Media Journal
    • /
    • v.9 no.1
    • /
    • pp.30-37
    • /
    • 2020
  • Enforcing additional authentication to password-based authentication, in addition to attempting to increase the security of the password itself, helps to improve the security of the password authentication scheme. For a well-known problem of using strong passwords that differ from site to site, we propose a scheme for password generation and management with an inherent supplementary authentication. Like the so-called password manager, the scheme retrieves and presents a strong site-specific password whenever requested without requiring the user to remember multiple passwords. Unlike the existing methods, however, the scheme permits the password retrieval process to proceed only through the authenticated user's ownership verified smartphone. Hence, even for sites not enforcing or supporting two-factor authentication, the logon process can benefit from the scheme's assurance of enhanced security with its two-factor equivalent authentication. The scheme can also prevent an attacker from impersonating a user or stealing secrets even when the stored information of the server for password retrieval service or the user's smartphone is leaked.

Study on the personal Information Retrieval of Smartphone Messenger Service (스마트폰 메신저 어플리케이션에서의 개인정보보호에 관한 연구)

  • Kang, Sunghoon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2013
  • The recent increase in smartphone usage has ignited the development of new applications which have changed the way of living in this internet era in the world. Almost all users which have smartphone have used many kinds of applications for lots of part. Especially, Social Network Service is the most popular part for smartphone users. The greater part of smartphone users take messenger service for smartphone. This kinds of applications provide to manage as deactivation of user or change of device. When users take to manage their information, their information would be deleted securely. If secure deletion didn't work correctly and released, their personal information can be easily abused to by others through various means such as internet phishing. In this paper, we analysis that the messenger application's management function keeps on the Personal Information Protection Act and suggest to prevent legally and technically for user's personal information and privacy.

Ensuring Anonymity for LBSs in Smartphone Environment

  • Alzaabi, Mohammed;Yeun, Chan-Yeob;Martin, Thomas Anthony
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.121-136
    • /
    • 2011
  • With the rapid growth of GPS-enable Smartphones, the interest on using Location Based Services (LBSs) has increased significantly. The evolution in the functionalities provided by those smartphones has enabled them to accurately pinpoint the location of a user. Because location information is what all LBSs depend on to process user's request, it should be properly protected from attackers or malicious service providers (SP). Additionally, maintaining user's privacy and confidentiality are imperative challenges to be overcome. A possible solution for these challenges is to provide user anonymity, which means to ensure that a user initiating a request to the SP should be indistinguishable from a group of people by any adversary who had access to the request. Most of the proposals that maintain user's anonymity are based on location obfuscation. It mainly focuses on adjusting the resolution of the user's location information. In this paper, we present a new protocol that is focused on using cryptographic techniques to provide anonymity for LBSs users in the smartphone environment. This protocol makes use of a trusted third party called the Anonymity Server (AS) that ensures anonymous communication between the user and the service provider.

The Effects of Metaphors in the Interface of Smartphone Applications on Users' Intention to Use (사용자환경의 메타포가 스마트폰 애플리케이션 사용의도에 미치는 영향)

  • Jung, Wonjin;Hong, Suk-Ki
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.255-279
    • /
    • 2014
  • It is not too much to say that smartphones have become an essential part of our lives due to their versatility. Nevertheless, they still have less overall capabilities than their desktop counterparts. Specifically, they have small screens and low resolutions, which make their applications difficult to have a usable interface. To account for these limitations, the interface of smartphone applications should be designed carefully and properly. Good interface design to any application is critical. However, a comprehensive information systems (IS) literature review found that there has been little research on the user interface design of smartphone applications. More specifically, there has been little empirical evidence and understanding about how metaphors, an imaginative way of describing objects and concepts, in the user interface of smartphone applications affect users' intention to use the applications. Thereby, the research goals of this study are to examine 1) the effects of the metaphors in the user interface of smartphone applications on the interaction between users and applications and 2) the effects of mediating variables including the interaction between users and applications, users' beliefs and attitudes, on users' intention to use the applications. A survey was conducted to collect data. University students and practitioners participated in the survey. A 24-item questionnaire was developed on a 5-point Likert-type scale. The measurement items were mostly adapted from the previous studies in the IS literature and modified to fit the context of this study. First, a principal component factor analysis was performed to explore the inter-relationships among a set of variables. The analysis showed that most of the items loaded quite strongly on the six components. The analysis also revealed the six components with eigenvalues exceeding 1, explaining a total of 70.7 per cent of the variance. The reliabilities of the items were also checked. Most Cronbach alpha values were above 0.8, so the scales were considered reliable. In sum, the results of the analysis support the decision to retain the six factors for further investigation. Next, the structural model was analyzed with AMOS structural equation modeling. The values of GFI, AGFI, NFI, TLI, CFI, and RMSEA were checked. The values showed that the research model considerably have a good fit in general. Next, the convergent and discriminant validities of all constructs were examined. The values for the standardized regression weights and critical ration (CR) indicated sufficient convergent validity for all constructs. In addition, the square root of the average variance extracted (AVE) of each construct was compared with its correlations with all other constructs. The results supported discriminant validity for all constructs. In sum, the results of analysis demonstrated adequate convergent and discriminant validities for all constructs. Finally, path coefficients between the variables were examined. Methphor was found to have an impact on interaction (${\beta}$ = .457, p = .000). There were also significant effects of the interaction on perceived usefulness (${\beta}$ = .273, p = .000) and ease of use (${\beta}$ = .405, p = .000). User attitude was significantly influenced by these two beliefs, perceived usefulness (${\beta}$ = .386, p = .000) and ease of use (${\beta}$ = .347, p = .000) respectively. Further, the results of analysis found that users' intention to use smartphone applications was significantly influenced by user attitude (${\beta}$ = .567, p = .000). Based upon the analyses, all hypotheses were supported. This study found that the metaphors used in the interface of smartphone applications affect not only the interaction between users and applications, but also users' intention to use the applications through the mediating variables, perceived usefulness and ease of use. These findings imply that if the metaphors used in the user interface of application are easy enough to understand for smartphone users, then the application can be perceived useful and easy to use, which in turn make users to have an intention to use the application. In conclusion, this study contributed not only to validate and extend Technology Acceptance Model (TAM) partially, but also to develop the construct of metaphor in smartphone settings. However, since a single empirical study cannot be enough to validate the findings, some limitations should be considered.

Motion Recognition of Smartphone using Sensor Data (센서 정보를 활용한 스마트폰 모션 인식)

  • Lee, Yong Cheol;Lee, Chil Woo
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1437-1445
    • /
    • 2014
  • A smartphone has very limited input methods regardless of its various functions. In this respect, it is one alternative that sensor motion recognition can make intuitive and various user interface. In this paper, we recognize user's motion using acceleration sensor, magnetic field sensor, and gyro sensor in smartphone. We try to reduce sensing error by gradient descent algorithm because in single sensor it is hard to obtain correct data. And we apply vector quantization by conversion of rotation displacement to spherical coordinate system for elevated recognition rate and recognition of small motion. After vector quantization process, we recognize motion using HMM(Hidden Markov Model).

Implementation of a Pet Care Robot Based on Webcam and Smartphone and its Power Management (웹캠과 스마트폰 기반의 반려 동물 돌봄 로봇의 구현 및 전원 관리)

  • Lee, Yoon-Ho;Jeon, Joo-Hyeon;Lee, Na-Eun;Jang, Jea-Moon;Yu, Shin;Joo, Moon G.
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.1
    • /
    • pp.29-34
    • /
    • 2021
  • We developed a pet care robot that can be controlled outdoors. Through the smartphone application, the pet owners can watch the situation in the house and manipulate the robot to make their pet happy. The video data in the house is transmitted to the application through the webcam installed at the house. The robot can not only perform user's command but also do six basic macro action. The obstacle avoidance function using the current sensor can be activated if the user want to use. When the robot hits to something, it moves back and rotates by arbitrary angle, and then moves forward.

A Study on the Social Commerce in Smartphone Environment (스마트폰 환경에서 소셜커머스 사용에 대한 연구)

  • Ahn, Hyunchul;Lee, Hyoung-Yong
    • Journal of Information Technology Services
    • /
    • v.14 no.1
    • /
    • pp.145-158
    • /
    • 2015
  • Currently, Social Commerces have increasingly gained popularity with the growth of Social Network Services (SNS). As the applications of smartphones are being applied in widespread areas, social commerces in the smartphone environment have entered a new chapter. The applications of social commerces on smartphones are widely used, which has increased the market share of social commerces exponentially. Thus, we tried to find out factors which may affect the user acceptance of social commerces in the smartphone environment. We develop a research model to examine how social commerces in the smartphone environment are accepted by users based on the academic factors-switch costs, trend-seeking tendency, richness in media. The theoretical model is validated through an survey of social commerce users in the smartphone environment from the undergraduates and the graduates in Seoul, Korea. The structural equation analysis is conducted based on the partial least square (PLS) approach. The results reveal that the switch cost will have positive mediating influences to the intention to use social commerce in the smartphone environment. We also find that the perceived usefulness of the smartphone is affected by the media richness. The results also suggest that the trend-seeking tendency has no influences to the users of social commerces in the smartphone environment. Also, theoretical and practical implications are discussed. The findings are believed to increase our understanding an interesting mobile phenomenon, as well as making contributions.

A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique (머신러닝을 이용한 사용자 행동 인식 기반의 PIN 입력 기법 연구)

  • Jung, Changhun;Dagvatur, Zayabaatar;Jang, RhongHo;Nyang, DaeHun;Lee, KyungHee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.5
    • /
    • pp.127-136
    • /
    • 2018
  • In this paper, we propose a PIN entry method that combines with machine learning technique on smartphone. We use not only a PIN but also touch time intervals and locations as factors to identify whether the user is correct or not. In the user registration phase, a remote server was used to train/create a machine learning model using data that collected from end-user device (i.e. smartphone). In the user authentication phase, the pre-trained model and the saved PIN was used to decide the authentication success or failure. We examined that there is no big inconvenience to use this technique (FRR: 0%) and more secure than the previous PIN entry techniques (FAR : 0%), through usability and security experiments, as a result we could confirm that this technique can be used sufficiently. In addition, we examined that a security incident is unlikely to occur (FAR: 5%) even if the PIN is leaked through the shoulder surfing attack experiments.

A Study of Behavior Based Authentication Using Touch Dynamics and Application Usage on Android (안드로이드에서 앱 사용과 터치 정보를 이용한 행위 기반 사용자 인증 기술 연구)

  • Kim, Minwoo;Kim, Seungyeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.361-371
    • /
    • 2017
  • The increase in user data stored in the device implies the increase in threats of users' sensitive data. Currently, smartphone authentication mechanisms such as Pattern Lock, fingerprint recognition are widely used. Although, there exist disadvantages of inconvenience use and dependence that users need to depend on their own memory. User behavior based authentication mechanism have advantages of high convenience by offering continuous authentication when using the mobile device. However, these mechanisms show limitations on low accuracy of authentication and there are researches to improve the accuracy. This paper proposes improved authentication mechanism that uses user's smartphone application usage pattern which has not considered on earlier studies. Also, we analyze performance of proposed mechanism with collected datasets from actual use of smartphone applications.