• Title/Summary/Keyword: Ubiquitous Business

Search Result 354, Processing Time 0.026 seconds

Understanding the Continuous Intention of the Smart Phone Use: The Case of a Delivery Services Company in Logistics (스마트폰의 지속적 사용에 관한 이해: 물류분야의 택배서비스업 사례)

  • Chung, Namho;Lee, Kun Chang
    • Knowledge Management Research
    • /
    • v.12 no.2
    • /
    • pp.56-68
    • /
    • 2011
  • The rapid changes in business environments are also applicable to the delivery service field. Numerous companies are using smart phones in order to perform work of the delivery service field that is rapidly developing every year. Smart phones established ubiquitous work environments where access to the server of the head office is possible through telephones, scanners, and the internet anywhere and anytime. However, although smart appliances including smart phones have been diffused, empirical analysis of use of them in actual has not been attempted much. In this regard, current study empirically analyzes how connectivity and context-awareness function of smart phones based on the TAM(Technology Acceptance Model) influence the continuous intention to use through trust, usefulness, and ease of use. The results indicate that the connectivity and context-awareness function, which are natures of smart phones, had impacts on the ease of use and trust, but not on the usefulness. Based on these results, this study suggests implications and future research directions regarding the planning and realization of smart appliances.

  • PDF

Design and Implementation of Customized Farming Applications using Public Data (공공데이터를 이용한 맞춤형 영농 어플리케이션 설계 및 구현)

  • Ko, Jooyoung;Yoon, Sungwook;Kim, Hyenki
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.6
    • /
    • pp.772-779
    • /
    • 2015
  • Advancing information technology have rapidly changed our service environment of life, culture, and industry. Computer information communication system is applied in medical, health, distribution, and business transaction. Smart is using new information by combining ability of computer and information. Although agriculture is labor intensive industry that requires a lot of hands, agriculture is becoming knowledge-based industry today. In agriculture field, computer communication system is applied on facilities farming and machinery Agricultural. In this paper, we designed and implemented application that provides personalized agriculture related information at the actual farming field. Also, this provides farmer a system that they can directly auction or sell their produced crops. We designed and implemented a system that parsing information of each seasonal, weather condition, market price, region based, crop, and disease and insects through individual setup on ubiquitous environment using location-based sensor network and processing data.

The Development and Operation of NFC-based Exhibition Support Service : A Motor Show Case (근접 무선 통신 기반 박람회 지원 서비스의 구축 및 운영 : 모터쇼 적용 사례)

  • Jun, Jungho;Choi, Myoung Hee;Lee, Kyoung Jun
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.83-97
    • /
    • 2014
  • With NFC technology, visitors can easily enjoy exhibit-related information and services. The participating firms can accumulate the visitor data and build up networks with potential visitors. This paper is to report an implementation and operation case of an NFC-based exhibition support service which creates new value as above. For this objective, we introduce the issues in constructing NFC-based exhibition support service. Moreover, we analyze visitor behaviors based on the tag touch data collected, and calculate the economic values generated. The NFC-based exhibition support service in this paper was applied to Hyundai Motors' booth in the 2013 Seoul Motor Show. This paper concludes with implications for business operators that are interested in applying NFC technology to exhibition spaces.

A Study on Factors that Influence the Attitude to Pirate Smartphone Application (스마트폰 애플리케이션 불법적 사용 태도에 미치는 요인 연구)

  • Kim, Joong Han
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.19-34
    • /
    • 2014
  • As the global smartphones market is growing at a brisk pace, their associated mobile applications are becoming increasingly ubiquitous in our daily life. The growth of mobile application business is explosive. Like other digital contents businesses, illegal downloads of copyrighted mobile applications become major obstacle in the future of the industry. In spite of anti-piracy efforts, the phenomenon has been getting worse. It is necessary to change the focus of current deterrence policies and strategies. This study investigates the factors influencing smartphone applications piracy behavior. For better understanding of illegal behavior, a research model of potential determinants for the piracy behavior is developed and empirically tested via path analysis using structural equation modeling. Findings show that social factors, beliefs concerning benefits from piracy, self-efficacy, and habit have significant effects on attitude toward smartphone application piracy. The result also shows perceived risks and facilitating conditions were not significantly related to their attitude. Implications for research and practice are discussed.

A Study on the Implementation of RFID for Korean Defense (RFID 군 적용방안 연구)

  • Lee, Jea-Youl;Kim, Seong-Won;Choi, Sang-Young
    • Journal of the military operations research society of Korea
    • /
    • v.31 no.1
    • /
    • pp.58-72
    • /
    • 2005
  • RFID(Radio Frequency Identification) is one of key technologies in ubiquitous computing. RFID system comprises tag, reader, and computer application. The tag is a small electronic chip, which is attached to a thing such as item, pallet, container. The reader has an tiny antenna obtaining the identification information of the things by radio frequency, and provides the information to the computer application for a business. In this paper we have proposed the military application of RFID and its implementation policy for the Korean armed forces. We believe that The principle application area would be logistics TAV(total asset visibility) and resource management, and the implementation should be achieved step by step considering the advancement of RFID technology and government policy.

An Analysis on the Commodity Trust of Internet Shopping Mall (인터넷 쇼핑몰에서의 상품신뢰에 대한 분석)

  • Cho, Won-Gil
    • International Commerce and Information Review
    • /
    • v.9 no.4
    • /
    • pp.67-89
    • /
    • 2007
  • The purpose of this study is to find out current problems facing the Commodity Trust of Internet Shopping Mall and to suggest proper solutions. the Commodity Trust of Internet Shopping Mall recently emerged as ubiquitous business environment that is not this only sales promotion but the Commodity Trust. Now we should have focused on the cooperation among the organizations in the Commodity Trust of Internet Shopping Mall; need various kind of government aids; need marketing-oriented and professional skills to build and enhance the growth of trade show exhibition industry. Accordingly, the important thing is an exploratory study of assessing the Commodity Trust of Internet Shopping Mall etc.

  • PDF

u-COEX : A collaborative supply platform based on EPCglobal network (u-COEX : EPCglobal network 기반의 협업형 통합주문관리 플랫폼)

  • Choi, Sung-Deok;Sohn, Yoon-Hwan;Kim, Cheong-Ghil
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.10 no.4
    • /
    • pp.148-154
    • /
    • 2011
  • This paper presents u-COEX, Ubiquitous-Collaborative Online shopping EXecution system, for small- and mediam- sized business enterprises, based on EPCglobal network. The system is taking advantage of RFID technology promises to optimize the critical processes in the Supply Chain Management. The system consists of five major functions: integrated order management, realtime monitoring and analysis system of sales and inventory, decision support system, integrating with EPCglobal and RFID technology, and u-catalog feature. The prototype implementation was developed for mass electronic market complex and the result revealed the feasibility to be applicable to real market.

  • PDF

Implementation of Efficient Keyboard-hacking prevention and Authentication Systems using a Smart Card (스마트카드를 이용한 효율적인 키보드 해킹 방지 및 인증 시스템 구현)

  • 황선태;박종선
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.191-194
    • /
    • 2003
  • In this paper, we describe the effective way of keyboard-hacking prevention and authentication system using a Smart Card. These days the securing information matters for pc-users are becoming more important as the internet business grows rapidly, and the ubiquitous computing environment is open tot everyone. Therefore, PC authentication is necessary to handle the access control to the target PC. Also, the keyboard-inputting information is necessary to be protected properly against the malicious attack. In this paper, we propose the keyboard-hacking protect systems and authentication system using a Smart Card, and show the conveniency and efficiency in the results.

  • PDF

Studying a Framework on Building Consumer Trust in Mobile Travel and Tourism Content (모바일 관광컨텐츠의 고객신뢰도 구축을 위한 프래임웍에 관한 연구)

  • Jeon, Hyo-Jae;Jo, Nam-Jae
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.425-433
    • /
    • 2005
  • The purpose of this paper is to study a framework on building and continuing consumer trust in mobile travel and tourism content (M-TTC). Trust development life cycle in e-commerce is a trust-oriented building flow of online consumer. Travel information and content in mobile commerce is a initiative and immature step in the ubiquitous era. Travel and tourism industry is information intensive and network business between the bricks and clicks, the public and private, and the virtual and physical. A framework of travel and tourism content in m-commerce based on Siau and Shen (2003) and in perspective of information cities by Ferguson, et al. (2004) proposes conceptual components to build information and content for continuous consumer trust. The main results of the paper by focus group research methodology focus on building a conceptual m-trust model of mobile content in travel and tourism industry. Additionally, it shows what the important factor is and how the trustworthy improves continuously to the public, mobile vendors, and technological aspects.

  • PDF

Tree Growth Management System using Hand-Held Type RFID based on CBD Methodolgy (컴포넌트 기반 방법론 및 핸드헬드형 RFID를 이용한 수목 생육 관리 시스템)

  • Jung, Se Hoon;Kwon, Young Wook;Sim, Chun Bo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.43-53
    • /
    • 2011
  • The many cities are changing in the city form where the person and nature are mixed. Namely, the government invests many expense in tree field of distance space for the change in the green city. In this paper, we design and implement a tree growth management system using PDA built in 13.56MHz RFID reader and CBD(Component Based Development) for ubiquitous computing environments. Our system provides history management to increase business efficiency for location coordinate of tree and history information of tree which using RFID, the RFlD tag is attaching the new tree and that is inputting GPS location information in PDA and provides tree information of tree by location coordinate to history management. Finally, we show from a performance analysis that our system achieves about 85% average tree read rate of RFID under test scenario environments.