• Title/Summary/Keyword: Technology provider

Search Result 535, Processing Time 0.026 seconds

The Effect of the Value Consumption on Customer Satisfaction and Behavioral Intention of Skin Care Service Users (피부미용서비스 이용자의 가치소비가 고객만족, 행동의도에 미치는 영향)

  • Park, Young-Rim;Yoon, Du-Yoon;Chon, Hae-Jung
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.1
    • /
    • pp.127-134
    • /
    • 2022
  • The purpose of this study is to examine the impact of value consumption on customer satisfaction of skin care service users. This research was conducted on consumers with experience in value consumption use, and data analysis was analyzed using the SPSS WIN 21.0 program. The results of this study are as follows: First emotional value, functional value and social value had a positive effect on customer satisfaction. Second social value and emotional value were found to have affected behavioral intention. In order to enhance customer satisfaction, the skin care service provider should not only provide reasonable and practical services, but also form emotional communication or social ties. Also, in order to increase behavioral intention, it should enhance social dignity or make people feel happy through diversion.

Tackling Privacy Paradox : Protecting Right to Self-determination of Personal Information by Estimating the Economic Value of Personal Information and Visualizing the Price

  • Lim, Sejoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.244-259
    • /
    • 2021
  • The economic value of personal information has its importance as an objective measure of valuation in commercial, legal, and policy areas. Until recently, however, personal information subjects have not properly recognized the economic value of personal information, which has led to the inability to exercise the right to self-determination of personal information by unconsciously agreeing to the terms and conditions of personal information service without recognizing the value of personal information provided to the service provider when subscribing to a specific service. Therefore, we will examine the methodologies for calculating the economic value of personal information and the practical guarantee of the right to self-determination of personal information and analyze the economic value of personal information through a survey. Also, we would like to propose various ways for the subject of personal information with limited cognitive resources to visually accept the economic value of personal information required by the terms and conditions and suggest the optimal visualization of personal information economic value to exercise the right to self-determination of personal information. To do so, in this paper, we have conducted two survey experiments to estimate the economic value of personal information. Based on the price of personal information by category retrieved from surveys, we have visualized the price of personal information in various forms and asked respondents to choose the optimal infographic that best represents the value of personal information visually. As a result, we have proposed an optimal usage of the infographic to 'nudge' information subjects about their right to self-determination of personal information, therefore opening the possibility of diminishing privacy paradox.

Study on the Development for Traffic Safety Curriculum of Automated Vehicles on Public Roads (실 도로 기반 자율주행자동차 교통안전 교육과정 개발 연구)

  • Jin ho Choi;Jung rae Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.266-283
    • /
    • 2022
  • With the rapid development of autonomous vehicle technology, unexpected accidents are occurring. Therefore, it is necessary to minimize user accident damage through the development of autonomous traffic safety education. Since edge cases, accident type, and risk factor analysis are important for realistic education, overseas case studies and demonstrations were carried out, and based on this, two curriculum for service providers and general users were developed. The service provider curriculum consisted of OEDR, sudden stop, cut-in, take-over, defensive driving, system malfunction, policy and information security education, and the general user curriculum consisted of attention duty, take-over, operating design domain, accidents type, laws, functions, information security education.

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

Design of AHRS using Low-Cost MEMS IMU Sensor and Multiple Filters (저가형 MEMS IMU센서와 다중필터를 활용한 AHRS 설계)

  • Jang, Woojin;Park, Chansik
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.1
    • /
    • pp.177-186
    • /
    • 2017
  • Recently, Autonomous vehicles are getting hot attention. Amazon, the biggest online shopping service provider is developing a delivery system that uses drones. This kinds of platforms are need accurate attitude information for navigation. In this paper, a structure design of AHRS using low-cost inertia sensor is proposed. To estimate attitudes a Kalman filter which uses a quaternion based dynamic model, bias-removed measurements from MEMS Gyro, raw measurements from MEMS accelerometer and magnetometer, is designed. To remove bias from MEMS Gyro, an additional Kalman filter which uses raw Gyro measurements and attitude estimates, is designed. The performance of implemented AHRS is compared with high price off-the-shelf 3DM-GX3-25 AHRS from Microstrain. The Gyro bias was estimated within 0.0001[deg/s]. And from the estimated attitude, roll and pitch angle error is smaller than 0.2 and 0.3 degree. Yaw angle error is smaller than 6 degree.

A Comparative Analysis of Domestic and Foreign Cloud Service Agreements (국내외 클라우드 서비스 이용약관 비교 분석 연구)

  • Song, Jiwon;Lee, Hwansoo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.8
    • /
    • pp.499-509
    • /
    • 2016
  • The MSIP has implemented "Act on The Development of Cloud Computing and Protection of Its Users" from September 2015 and invigorated the cloud service industry. The act mainly includes the improvement cloud computing reliability and user protection for the development foundation and use activation. In order to expand the cloud market, it is important to increase the reliability of individual users. However, practical discussions and approach for cloud services adoption are still limited. In fact, there is no agreement standard for domestic cloud services. As a user agreement is not standardized, users feel difficulty compare to each agreement of cloud service provider and may be damaged because of unfair terms. Thus, it is necessary to examine the unfairness of cloud service agreement for user protection. This study analyzes domestic and foreign cloud service agreements including Practical Guide to Cloud Service Agreement of Cloud Standards Customer Council and suggests the direction of the standard agreement of cloud services.

A Research on the Transference of Trust from Service Provider to MyData Banking Service (서비스 제공 기업에 대한 신뢰가 금융 마이데이터 서비스에 전이되는 현상에 관한 연구)

  • Ah Ro Kum;Jung Hoon Lee;Yun A Yeo
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.97-121
    • /
    • 2024
  • As data usage grows in importance, ensuring individual control over personal information becomes critical. The emergence of the 'MyData' concept addresses this, particularly in financial services. Although the institutional and technological framework for financial MyData services is in place, there's a need to establish consumer understanding and perception of its usefulness and safety for successful activation. This study focuses on investigating the impact of trust on the intention to use the new mobile banking service, financial MyData. This study has three objectives. Firstly, to analyze whether trust in financial MyData services and trust in financial MyData service providers affect the intention to use financial MyData services. Secondly, to analyze the process of forming trust in financial MyData services based on the phenomenon of transferring trust in service providers to trust in services. Thirdly, to identify the process by which trust transfer occurs between service providers and financial MyData services. Ultimately, the goal of this study is to promote the intention to use financial MyData services based on the concept of trust and to activate these services. In summary, this study emphasizes the significance of trust in financial MyData services, exploring its impact on user intention and the transfer of trust from providers to services. By promoting consumer trust, the research aims to contribute to the activation of financial MyData services.

A Study on the Improvement of Future-Oriented Air Traffic Control Services (미래지향적인 항공교통관제서비스 개선에 관한 연구)

  • Jin-Yong Jung
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.6
    • /
    • pp.699-709
    • /
    • 2023
  • As the global air traffic volume has shown a rapid increase, doubling every 15 years since 1977, domestic and international air traffic control services and air navigation safety facility operation management system and status review It is necessary to present the feasibility of establishing an air traffic control agency with integrated functions and establish an operating system for an independent dedicated agency to provide advanced air traffic control services in preparation for the future air transport environment. In particular, in 2021, the national ATM reformation and enhancement (NARAE) a customized comprehensive plan for operations, facilities, and systems to handle air traffic safely and efficiently by actively reflecting changes in the navigation environment such as international policies and standards as this is established, the role of the air traffic control agency becomes more important, and an improved action plan for the control and navigation operating system must be promoted.

The Impact of Mobile Channel Adoption on Video Consumption: Are We Watching More and for Longer? (모바일 채널 수용이 고객의 동영상 소비에 미치는 영향에 관한 실증 연구)

  • SangA Choi;Minhyung Lee;HanByeol Stella Choi;Heeseok Lee
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.121-138
    • /
    • 2023
  • The advancement in mobile technology brought disruptive innovation in media industry. The introduction of mobile devices broke spatial and temporal restrictions in media consumption. This study investigates the impact of mobile channel adoption on video viewing behavior, using real-world dataset obtained from a particular on-demand service provider in South Korea. We find that the adoption of a mobile channel significantly increases the total viewing time of video-on-demand via TV and the number of contents viewed. Our results suggest that the mobile channels act as a complement channel to conventional TV channels. We provide theoretical and practical insights on consumer usage in the emerging over-the-top market.

A Study on EC Acceptance of Virtual Community Users (가상 공동체 사용자의 전자상거래 수용에 대한 연구)

  • Lee, Hyoung-Yong;Ahn, Hyun-Chul
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.147-165
    • /
    • 2009
  • Virtual community(VC) will increasingly be organized as commercial enterprises, with the objective of earning an attractive financial return by providing members with valuable resources and environment. For example, Cyworld.com in Korea uses several community services to enable customers of Cyworld to take control of their own value as potential purchasers of products and services. Although initial adoption is important for online network service success, it does not necessarily result in the desired managerial performance unless the initial usage is continuously related to the continuous usage and purchase. Particularly, the customer who receives relevant online services and is well equipped with online network services, will trust the online service provider and perceive less risk and experience more activities such as continuous usage and purchase. Thus, how to promote continued online service usage or, alternatively, how to prevent discontinuance is a critical issue for VC service providers to consider. By aggregating a wide range of information and online environments for customers and providing trust to its members, the service providers of virtual communities help to reduce the perceived risk of continuous usage and purchase. Drill down, online service managers realize that achieving strong and sustained customers who continuously use online service and purchase on it is crucial. Therefore, the research into this online service continuance will identify the relationship between the initial usage and the continuous usage and purchase. The research of continuous usage or post adoption has recently emerged as an important issue in the IS literature. Individuals' information systems(IS) continuous usage decisions are congruent with consumers' repeat purchase decisions. The TAM(Technology Acceptance Model) paradigm has been strongly confirmed across a wide range from product purchase on EC to online service usage contexts. The analysis of IS usage based on TAM has proven to be successful across almost online service contexts. However, most of previous studies have focused on only an area (i.e., VC or EC). Just little research has tried to analyze the relationship between VC and EC. The effect of some factors on user intention, captured through several theories such as TAM, has been demonstrated. Yet, few studies have explored the salient relationships of VC users' EC acceptance. To fill this gap between VC and EC research, this paper attempts to develop a research model that extends the TAM perspective in view of the additional contributions of trust in the service provider and trust in members on some factors that affect EC and VC adoption. In this extension, we applied the TAM-to-TAM(T2T) model, and analyzed the transfer effect of trust between these two TAMs. The research model was empirically tested on the context of a social network service. The model was to extend TAM with the trust concept for the virtual community environment from the perspective of tasks. By building an extended model of TAM and examining the relationships between trust and the existing variables of TAM, it is aimed to explain a user's continuous intention to use VC and purchase on EC. The unit of analysis in this paper is an individual user of a virtual community. The population of interest is the individual with the experiences in virtual community. The data for this paper was made available via a Web survey of VC users. In total, 281 cases were gathered for about one week, but there were some missing values in the sample and there were some inappropriate cases. Thus, only 248 cases were finally analyzed. We chose the structural equation analysis to test the hypotheses and it is better suited for explaining complex relationships than the other methods. In this test, AMOS was used to test the Structural Equation Model (SEM). Noticeable results have been found in the T2T model regarding the factors affecting the intention to use of virtual community and loyalty. Our result showed that trust transfer plays a key role in forming the two adoption beliefs. Overall, this study preliminarily confirms the salience of trust transfer in online service.