• Title/Summary/Keyword: User Acceptance Of Information Technology

Search Result 295, Processing Time 0.027 seconds

Characteristics of Smartphone User in Application Usage and Implications for Applications Business Model (스마트폰 사용자들의 앱 이용 특성과 앱 비즈니스 모델에의 시사)

  • Yun, Hyung Bo;Wang, Boram;Park, Jiyun
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.32-42
    • /
    • 2013
  • As the smartphone market grows, the needs for its new business model are also increased. However, most previous researches on smartphone applications focused on Technology Acceptance Model(TAM) and Rogers' Diffusion of Innovation Theory so that there was lack of researches on characteristics for actual smartphone users. In this research, we divided the smartphone applications into five category functions (Call & Text/Music & Video/Information Search/Game/Social Network Service (SNS)). We analyzed characteristic differences of users who used the each application category and found that the differences were statistically significant in both demographic and smartphone usage characteristics (frequency of downloading applications, and download experience of paid applications). Additionally, the smartphone usage characteristic is closely related to the usage duration. The representative result is that the characteristics of people used Music & Video function actively were women in their 20s who downloaded applications more than three times per week, and had a download experience of paid applications. It is positive result for players in the application markets, because it means the users are willing to pay for downloading the paid applications. However, large companies already occupied most of the market share in music applications so that small and medium-sized players should develop an innovative and distinguishable business model in order to success. We believe this research result would provide significant implications for the players in planning the successful business model and developing an user-specific application product.

Proposals to improve government funding of domestic start-up businesses through Living Lab: Focus on Korea Credit Guarantee Fund (사용자 주도의 개방형 혁신을 통한 국내 스타트업 대상의 정부 자금지원 개선 방안 제언: 신용보증기금을 중심으로)

  • Park, Jun-Su
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.301-312
    • /
    • 2018
  • The purpose of this study is to propose strategies for enhancing competitiveness through the utilization of policy funds, especially in the start-up companies supported by the Korea Credit Guarantee Fund. And then, the Korea Credit Guarantee Fund should develop 'user-centered policy funding model' in order to increase start-up's utilization of policy fund and support start-ups that are supported in the long run. The competitiveness of domestic start-up companies has been strengthened by 'user-centered policy funding model' and new innovations have been introduced through 'Living Lab', an open innovation. But, in order to overcome the limitation of reaching the stage of commercialization, the 'user-centered policy funding model' proposed in this study enables start-ups to be the subject of actual policy funding, and also allows users to freely apply for necessary funding at any time. Therefore, the Korea Credit Guarantee Fund has a significance in suggesting 'user-centered policy funding model' as a support model to be customized. However, since SMEs recognize the actual situation and limit acceptance of all the difficulties, the systematic analysis of the actual situation of the policy funds of the start-up by the credit guarantee fund and the related support institutions for the scientific approach of the user-oriented policy funding model need.

Multi-Agent Systems: Effective Approach for Cancer Care Information Management

  • Mohammadzadeh, Niloofar;Safdari, Reza;Rahimi, Azin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.12
    • /
    • pp.7757-7759
    • /
    • 2013
  • Physicians, in order to study the causes of cancer, detect cancer earlier, prevent or determine the effectiveness of treatment, and specify the reasons for the treatment ineffectiveness, need to access accurate, comprehensive, and timely cancer data. The cancer care environment has become more complex because of the need for coordination and communication among health care professionals with different skills in a variety of roles and the existence of large amounts of data with various formats. The goals of health care systems in such a complex environment are correct health data management, providing appropriate information needs of users to enhance the integrity and quality of health care, timely access to accurate information and reducing medical errors. These roles in new systems with use of agents efficiently perform well. Because of the potential capability of agent systems to solve complex and dynamic health problems, health care system, in order to gain full advantage of E- health, steps must be taken to make use of this technology. Multi-agent systems have effective roles in health service quality improvement especially in telemedicine, emergency situations and management of chronic diseases such as cancer. In the design and implementation of agent based systems, planning items such as information confidentiality and privacy, architecture, communication standards, ethical and legal aspects, identification opportunities and barriers should be considered. It should be noted that usage of agent systems only with a technical view is associated with many problems such as lack of user acceptance. The aim of this commentary is to survey applications, opportunities and barriers of this new artificial intelligence tool for cancer care information as an approach to improve cancer care management.

Design and Implementation of Side-Type Finger Vein Recognizer (측면형 지정맥 인식기 설계 및 구현)

  • Kim, Kyeong-Rae;Choi, Hong-Rak;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.159-168
    • /
    • 2021
  • As the information age enters, the use of biometrics using the body is gradually increasing because it is very important to accurately recognize and authenticate each individual's identity for information protection. Among them, finger vein authentication technology is receiving a lot of attention because it is difficult to forge and demodulate, so it has high security, high precision, and easy user acceptance. However, the accuracy may be degraded depending on the algorithm for identification or the surrounding light environment. In this paper, we designed and manufactured a side-type finger vein recognizer that is highly versatile among finger vein measuring devices, and authenticated using the deep learning model of DenseNet-201 for high accuracy and recognition rate. The performance of finger vein authentication technology according to the influence of the infrared light source used and the surrounding visible light was analyzed through simulation. The simulations used data from MMCBNU_6000 of Jeonbuk National University and finger vein images taken directly were used, and the performance were compared and analyzed using the EER.

Evolving the Cybersecurity of Clinical Photography in Plastic Surgery

  • Daisy L. Spoer;Alexandra Junn;John D. Bovill;Zoe K. Haffner;Andrew I. Abadeer;Stephen B. Baker
    • Archives of Plastic Surgery
    • /
    • v.50 no.4
    • /
    • pp.443-444
    • /
    • 2023
  • Point-of-care photography and photo sharing optimize patient outcomes and facilitate remote consultation imperative for resident surgeons. This literature review and external pilot survey study highlight the risks associated with current practices concerning patient privacy and biometric security. In a survey of 30 plastic surgeon residents and attendings, we found that the majority took photos of patients with their iPhones and shared them with colleagues via Apple iMessage. These findings corroborate previous reports and highlight a lack of physician user acceptance of secure photo-sharing platforms. Finally, we frame a successful example from the literature in the context of a postulated framework for institutional change. Prioritizing the privacy and safety of patients requires a strategic approach that preserves the ease and frequency of use of current practices.

A Study of the Factors Influencing Adoption of Mobile VoIP: Applying the UTAUT Model (모바일 VoIP 수용에 영향을 미치는 요인 연구 : UTAUT 모형을 중심으로)

  • Kim, Su-Yeon;Lee, Sang Hoon;Hwang, Hyun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.7
    • /
    • pp.3238-3246
    • /
    • 2013
  • The progress of Information Technology enables people can communicate each others using the Internet. As a smartphone proliferates, many free mobile VoIP(Voice over IP) application are developed and accepted by smartphone users. In this study we investigate the factors affecting the acceptance of mobile VoIP applications and the structural relationship among these factors. We review the related works and extract the related factors and build a research model describing the causal relationship among these factors. We conduct an empirical study - a survey and statistical analysis - to verify the research model. EFA(Exploratory Factor Analysis) is applied for variables in the survey and SEM(Structural Equation Model) is used to reveal the structural relationship among the factors. We can find that two factors - usefulness of mobile VoIP and social influence - positively affect usage intention and actual use. These findings imply that it is required to emphasize the benefits of mobile VoIP use and add S/W functionalities enhancing social influence.

Monitoring System with PLC I/O for Car Parking Lot (Car Parking Lot 모니터링 시스템)

  • Lee, Seong-Jae;Kim, Jae-Yang
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2007.06a
    • /
    • pp.511-512
    • /
    • 2007
  • The monitoring system has won acceptance as a premium mark that identifies the highest standard of product quality in advanced industry. The TOP features with multi-I/O ports and VGA & RCA TV-out ports supporting mirroring & multiple dual-display modes by windows 0/5. With the choice of versatile stands, panel mount, or VESA wall-mount swing arm and connecting to modem. Wireless keyboard, Customer Display and Card Reader, is your idea Panel system for the application of TOP(Touch Operation Pannel), KIOSK, or Office / Factory Automation. TOP is the hardware and software product that transacts all kind of functions for advanced technology equipment to button, switch, voice and graph etc so that let consumer use easily Industrial HMI System Touch Panel. System characteristics: Easy of use and flexibility to the user, Present a high value solution and advanced function for many Application, Factory Automation, Office Automation, Building Automation System, Information Service System, etc. Analog Touch - 2MB Flash Memory for Saving Screen Data - RS-232C/422 Serial Port - Multi Language Support.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Librarians' Intention and Behaviors for Providing Podcasts and YouTube Services: An Application of Extended Technology Acceptance Model (도서관 팟캐스트와 유튜브 서비스에 대한 사서의 제공 의도와 제공 행위 연구 - 확장된 기술수용모델의 적용 -)

  • Ahn, EunJi;Oh, Sanghee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.4
    • /
    • pp.187-217
    • /
    • 2021
  • This study investigated the perceptions of librarians about Podcast and YouTube services in libraries. The study was designed by applying the Extended Technology Acceptance Model. Librarian's personal, organizational, and social awareness of library Podcast or YouTube services and the degree of understanding of users and their needs on services were mediated by perceived usefulness or ease of services= and influenced to having intentions and providing the services. First, we investigated the types of Podcast and YouTueb services provided by 39 libraries in Korea. Also, we collected data using an online survey method from 181 librarians and conducted hierarchical multiple regression analysis. Findings showed that libraries are using Podcast and YouTube appropriately considering features and functions of media, mainly for library event information/promotion, library programs, book recommendations, and author (librarian) lectures or interviews. Organizational or social awareness of librarians, i.e., library educational support, human resource supports, librarian recognition, job-related features, and understanding of user perceptions and needs, influenced the intention to provide library services. Also, there was a difference in perceived usefulness and ease of services between librarians who provided Podcast and YouTube services and those who did not. We expect that findings could be used as references to understand and support various aspects of librarians in charge of developing and providing Podcast or YouTube services in libraries.

Prioritization Analysis for Contents Sensibility Evaluation of the Future Mobility (차세대 이동공간 대상의 콘텐츠 감성 평가를 위한 우선순위 도출)

  • Lee, Jung Min;Ju, Da Young
    • Science of Emotion and Sensibility
    • /
    • v.21 no.1
    • /
    • pp.3-16
    • /
    • 2018
  • The emergence of the fourth industrial revolution is rapidly changing the conventional society and the industry, eroding the boundaries among the technology, culture, and finance. In the mobility industry, as the engineering-based industry converges with the information technology, the mobile space is changing from mobility or safety-centric space into space where the passengers can consume infotainment or contents services. The contents evaluation of the future mobility is conducted in terms of usability or technology acceptance aspect, but according to the trend analysis, the mobility industries, such as vehicle OEMs, it is necessary to evaluate the emotional or sensibility factors for the development of their future mobile space design. Herein, this research study evaluates which sensibility factor should be evaluated in priority to develop the contents interaction in the future mobile space. Thus, using Patrick Jordan's Four Pleasure Model, the priority evaluation has been conducted among 116 Korean drivers. As a result of the statistical analysis and AHP (Analytic Hierarchy Process), it has been found that first, it is necessary to evaluate psychological, ideological, social and physical sensibility in the respective order, and second, it is necessary to evaluate based on the contents user type.