• 제목/요약/키워드: User's Need

검색결과 1,058건 처리시간 0.03초

전문대학도서관의 공간구성 특성에 따른 이용만족도 연구 (A study on user Satisfaction of the Junior College Library based on its Characteristics of Space Composition)

  • 이수영
    • 교육시설 논문지
    • /
    • 제24권6호
    • /
    • pp.37-44
    • /
    • 2017
  • This study is about user satisfaction of the Junior College Library based on its characteristics of space composition. For this, we studied characteristics of space composition targeting the libraries in colleges in Seoul and Gyeonggi-do. First, in case of study of characteristics of space composition for books and library data, student satisfaction for traditional and normal library areas was high. It means that the service based on library areas should start from normal library areas as well as there is a change about space as the type of data in libraries change to electric data and multimedia. Second, If we look at the space for a reader and a user, satisfaction for a normal reading room was high. we can also see that satisfaction for a computer room and a multimedia reading room was not higher but still high. Also, the reason why satisfaction for a multimedia reading room that provides various activities was high was that the complex of a library space is needed to provide users with various activities. Third, in case of space for programme function and meeting, satisfaction for the room of video information and the group study room was high. we can see that user satisfaction for the space got high basically when a user is satisfied with the proper information technology based on interaction Fourth, as a result of variance analysis of 3 spaces of Junior College Library and the services, the size of the space of service does not influence user satisfaction directly. Even the space is small, if it decorates variously like with a lighting for a user, a window seat to meet the nature of users and has specific factors such as space reservation using internet, user satisfaction is high. If we summarise the result of this study, to make user satisfaction for speace in a Junior College Library higher, not just we need to try to make it extend as a educational, a cultural place but we also need to accept the student's requirement that the space also needs to be extend as a complex cultural space.

How Query by humming, a Music Information Retrieval System, is Being Used in the Music Education Classroom

  • Bradshaw, Brian
    • Journal of Multimedia Information System
    • /
    • 제4권3호
    • /
    • pp.99-106
    • /
    • 2017
  • This study does a qualitative and quantitative analysis of how music by humming is being used by music educators in the classroom. Music by humming is part division of music information retrieval. In order to define what a music information retrieval system is first I need to define what it is. Berger and Lafferty (1999) define information retrieval as "someone doing a query to a retrieval system, a user begins with an information need. This need is an ideal document- perfect fit for the user, but almost certainly not present in the retrieval system's collection of documents. From this ideal document, the user selects a group of identifying terms. In the context of traditional IR, one could view this group of terms as akin to expanded query." Music Information Retrieval has its background in information systems, data mining, intelligent systems, library science, music history and music theory. Three rounds of surveys using question pro where completed. The study found that there were variances in knowledge, training and level of awareness of query by humming, music information retrieval systems. Those variance relationships where based on music specialty, level that they teach, and age of the respondents.

전자상거래 사용자의 신뢰에 영향을 미치는 정보보안위험 기반의 선행요인 연구 (A Research on Information Security Risk-based Antecedents Influencing Electronic Commerce User's Trust)

  • 김종기;이동호
    • Asia pacific journal of information systems
    • /
    • 제15권2호
    • /
    • pp.65-96
    • /
    • 2005
  • It is generally believed that, compared to traditional commerce, Electronic Commerce(EC) is more difficult to gain and sustain customers. One of the major reasons that customers do not use EC is lack of trust. Previous researches on the EC user's trust suggested that risk is an antecedent of trust and the concept of trust is highly related to risk. This study proposed a combined model in which includes the factors based on generic information security risk analysis methodology and trust factors in EC. The objectives of this study are follows; first, investigating the relationship between trust and risk that are antecedent factors of purchase intention, and second, examining the validity of information security risk analysis approach in EC environment. Based on the survey results of 143 MBA students statistical analysis showed that factors like threats and controls were significantly related to risk, but assets did not have statistically significant relationship with risk. Controls and knowledge of EC had meaningful effect on user's trust. This study found that risk analysis methodology which is generally used at organizational level is practically useful at user level on EC environment. In conclusion, the results of this study would be applied to generic situation of information security for analyzing and managing the risk. Besides, this study emphasized that EC vendors need to pay more attention to the information security risk to gain customer's trust.

양방향 DMB 서비스를 위한 사용자 이벤트 분석 모듈 (User Event Analyzer for Bidirectional DMB Data Service)

  • 이송록;라잉수킨;김상욱
    • 한국HCI학회:학술대회논문집
    • /
    • 한국HCI학회 2007년도 학술대회 1부
    • /
    • pp.624-629
    • /
    • 2007
  • Digital Multimedia Broadcasting (DMB) is a digital radio transmission system for sending multimedia such as radio, TV, and data casting to mobile devices. Nowadays, DMB specifications are the major standard for digital broadcasting and have been establishing for bidirectional service using MPEG-4 system. But there has been only some simple demonstrated system for this bidirectional services. In this paper, we introduce bidirectional DMB data service system that provides the interaction between the user and DMB server without any additional equipment such as web server. The proposed bidirectional DMB system can capture and send user interaction information and response through the existing DMB transmission channel, finally update the original contents. The action event from the user is the most important thing in developing the bidirectional DMB system. Therefor, capturing the event data from the user is the first step we need to do for the bidirectional DMB service. In this paper, we propose an interaction manager module for the user events. This system will extract the user events and make a plan to update the original scene with the server's reaction information.

  • PDF

클라우드 오피스 이용 활성화 : DeLone and McLean 정보시스템 성공모형의 적용 (A Study on the Use Activation of the Cloud Office with Focus on DeLone and McLean IS Success Model)

  • 윤승정;김민용
    • 한국IT서비스학회지
    • /
    • 제14권2호
    • /
    • pp.289-314
    • /
    • 2015
  • Recently, Most of the companies and government offices are under consideration about the adoption of cloud office service to actualize the smart work policies. Comparing with traditional office software, a cloud office service have the advantage of the method of payment and coming over the physical limitations. Many cloud office service users tend to adopt an official evaluated the service without doubt. However after deciding to adopt cloud office service, many users are faced with a variety of problems and difficulties practically. In this study, researchers carried out interview about those problems and difficulties after adopting a cloud office service. Consequently, there are several problems and difficulties such as compatibility, document security, document lost and maladjusted to the new graphic user interface between traditional office software and a cloud office service. A cloud office service have still several advantages not only a competitive price but also ubiquitous attributes. Thus, researchers need to study about what kinds of reason variables can solve those problems and difficulties. In existing research, DeLone & McLean have suggested information system success model. They use three independent variables which are system quality, information quality, service quality. Parameters are user satisfaction, intention to use and use. Lastly, dependent variables are net benefits. However in this study, we need to change the scope of measurement. In other words, we have to replace parameters with dependent variables. Simply, user satisfaction, intention to use and use is going to be dependent variables. There are several reasons why we need changing variables. First, we aim at giving a some suggestions to a cloud service providers which independent variables do not work to satisfy for the users. Second, we need to find out how to maximize cloud office service user's satisfaction and intention to use. Third, we should firstly know that relationship between independent variables and dependent variables. Finally, those research results give for the cloud office service provider to solve the cloud office service adopting problems and difficulties.

A New Roaming Authentication Framework For Wireless Communication

  • Li, Xiaowei;Zhang, Yuqing;Liu, Xuefeng;Cao, Jin;Zhao, Qianqian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권8호
    • /
    • pp.2061-2080
    • /
    • 2013
  • Roaming authentication protocol is widely used in wireless network which can enable a seamless service for the mobile users. However, the classical approach requires the home server's participation during the authentication between the mobile user and the foreign server. So the more the roaming requests are performed the heavier burden will be on the home server. In this paper, we propose a new roaming authentication framework for wireless communication without the home server's participation. The new roaming authentication protocol in the new framework takes advantage of the ID-based cryptography and provides user anonymity. It has good performance compared with the roaming authentication protocols whose authentication do not need the home server's participation in terms of security and computation costs. Moreover, a new User-to-User authentication protocol in the new framework is also present. All the authentications proposed in this paper can be regarded as a common construction and can be applied to various kinds of wireless networks such as Cellular Networks, Wireless Mesh Networks and Vehicle Networks.

무선 인지 기반 시스템에서 QoS 보장 동적 주파수 할당 (A Dynamic Frequency Allocation for Provisioning QoS in Cognitive Radio System)

  • 이문호;이종찬
    • 한국산업정보학회:학술대회논문집
    • /
    • 한국산업정보학회 2008년도 추계 공동 국제학술대회
    • /
    • pp.634-642
    • /
    • 2008
  • Radio wave is the valuable resources in $21^{st}$ century. It will be widely used in various applications such as DMB, USN, telematics, and home network as well as mobile and wireless communications. Cognitive Radio technology is devised to maximize the utilization of radio resources by sensing near-by spectrum and dynamic and allocating free resources dynamically and adaptively. Wireless links for the secondary user need to be frequently switched to idle frequencies during the transmission of multimedia data in the cognitive radio based system. This may cause delay and information loss, and QoS degradations occur inevitably. The efficient frequency allocation scheme is necessary to support the seamless multimedia service to the secondary user while maintaining QoS of the primary user. This paper suggests a frequency selection scheme which considers other parameters such as cell load, data rate, and available bandwidth than just received signal strength during the frequency selection process. The performance of our proposed scheme is analyzed by simulation.

  • PDF

스마트폰의 사용자 경험이 만족에 미치는 영향 연구 (The effect of the user experience of smart phone on satisfaction)

  • 정상래;신현식
    • 한국전자통신학회논문지
    • /
    • 제7권5호
    • /
    • pp.1087-1093
    • /
    • 2012
  • 본 연구는 스마트폰의 사용자경험 요소가 고객의 만족에 미치는 영향을 연구하였다. 사용자 경험요인은 선행연구를 바탕으로 유용성, 사용성, 감성, 브랜드 이미지로 하였고, 연구대상은 S사의 스마트폰 사용자 97명과 A사의 스마트폰 사용자 94명을 대상으로 하였다. 연구결과 스마트폰의 사용자 경험이 만족에 미치는 영향은 유용성 44.0%, 브랜드 이미지가 26.2%, 감성이 19.6%, 사용성이 17.3%의 영향을 미치는 것으로 나타났다. 유용성과 감성은 기술디자인의 핵심적인 요소로서 사용자지향의 설계에 중점을 두었을 때 만족을 높일 수 있다는 점에서 스마트폰 관련 설계자들이 가장 고려해야할 사항이라 할 것이다. 이러한 관점에서 S사 제품의 감성적 측면이 만족에 영향을 미치지 않고 있다는 것은 개선이 시급하다고 하겠다.

S/MIME을 적용한 안전한 지불 메커니즘 설계 (Design of a Secure Payment Mechanism based on S/MIME)

  • 전철우;이종후;이상호
    • 한국정보과학회논문지:정보통신
    • /
    • 제29권5호
    • /
    • pp.482-494
    • /
    • 2002
  • 최근 등장한 메일 기반의 계좌이체 시스템은 송금인이 수금인의 계좌번호를 알 필요 없이 메일 주소만 알면 계좌 이체가 가능하도록 하여 사용자에게 많은 편의를 제공한다. 그러나 대부분의 메일기반 계좌이체 시스템은 SSL 기반으로 동작하고 있어 거래 사실에 대한 부인이 가능하고, 영수증 발급이 불가능하다는 문제점이 있다. 이에 따라 이 논문에서는 기밀성, 무결성, 사용자 인증, 부인 봉쇄 둥의 보안 서비스를 제공하고 인증서 기반으로 동작하는 국제 표준 메일 보안 메커니즘인 S/MIME을 적용한 메일 기반의 지불 메커니즘을 제안한다. 이 메커니즘에서는 'Check'라는 수표와 같은 역할을 하는 메시지를 통해 모든 계좌이체 정보가 송금인과 수금인 및 메일 결제 서버 사이에서 전달된다. 이 시스템은 기존의 시스템과 마찬가지로 수금인의 메일 주소만 알면 계좌이체가 가능한 편리성을 제공함과 동시에 S/MIME에 기반한 보안 서비스를 제공함으로서 기존 지불 시스템에서 가장 문제가 되는 송신 부인 문제를 해결하고 영수증 발급도 가능하다.

스마트 카드를 이용한 원격 사용자 인증 방안 (A Remote User Authentication Scheme Using Smart Cards)

  • 유종상;신인철
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 하계종합학술대회 논문집(3)
    • /
    • pp.51-54
    • /
    • 2001
  • Recently Hwang and Li[1] proposed a remote user authentication scheme using smart cards. Their scheme is based on the ElGamal public key cryptosystem and does not need to maintain a password table for verifying the legitimacy of the login users. In this paper, we proposed an advanced user authentication scheme using smart cards. Unlike Hwang and Li's scheme, smart card contains a pair of public parameters(h, P) where h is a hash function which is used in login phase. In result, we reduce one exponential computation frequency in login phase and two exponential computation frequencies in authentication phase with comparing the Hwang and Li's scheme. The proposed scheme not only provides the advantages as security of Hwang and Li's scheme, but also reduces computation cost.

  • PDF