• Title/Summary/Keyword: User Impact

Search Result 948, Processing Time 0.029 seconds

Analysis the Types of Consumer Damages Incurred by Using a Digital Contents (디지털콘텐츠 소비자 피해유형 분석)

  • Nam, Su-Jung;Lee, Eun-Hee;Park, Sang-Mi
    • Korean Journal of Human Ecology
    • /
    • v.16 no.6
    • /
    • pp.1197-1209
    • /
    • 2007
  • The advance of digital contents industry shifts the focus of consumptions; from analogue to digital ones. It gives significant impact on individual life as well as overall society and culture, and it leads to the increased consumption of digital contents. Nevertheless, current digital contents industry fails to secure the sufficient consumer protection systems including relevant rules and laws which regulate the distribution, use, and other transaction activities of digital contents and the efforts, on the part of contents providers, to provide information to consumers and to protect them. Digital contents, by its nature, is different from the existing products so that its nature is likely to cause unique consumer problems totally different from the offline transactions and the electrical transactions of existing products. This study, therefore, aims to identify the possible problems which may be incurred by consumers in their use of digital contents, specify the types of consumer damages, and provide the underlying materials to improve the systems related to digital contents and take legally complementary measures for consumer protection. To identify the types of consumer damages, this study analyzed the results from consumer counselling cases, experts opinion survey, and FGI. For consumer damage cases, this study analyzed the consumer complaints received by open consumer counselling sites of the Korea Consumer Agency and Seoul Electronic Commerce Center. For experts opinion survey, it conducted questionnaire survey of the group of experts from digital contents manufacturers or providers, and those who treated consumer damages directly. For FGI analysis, it organized a panel of students and employees who had used digital contents to understand the types of consumer damages. The results of this study can be summed up as follows. Based on the results from consumer counselling cases, experts opinion survey, and FGI analysis, the consumer damages related to digital contents can be classified, in their nature, into economic or financial damages (25 cases), emotional or psychological ones (15 cases), time-related ones (7 cases), physical ones (4 cases), and privacy-related ones (i.e. leakage of personal data)(3 cases). More specifying the types of damages, damages can be subdivided into contract-, charge-, maintenance-, use-, individual-related ones and other ones. Among them, both contract- and charge-related damages appeared only in the economic or financial damages, whereas user-specific individual damages appeared only in physical and emotional or psychological ones. On the other hand, maintenance- and use-related damages and other ones were observed in both categories of economical or financial damages and time-related ones. Use- and privacy-related damages, in particular, caused emotional or psychological damages.

Effect on Food Choice Satisfaction and Food Cost Reduction of Food Donation Program (기부식품제공사업이 저소득층 이용자의 식품만족에 미치는 영향)

  • Lee, Yong-Jae;Kim, Yang-Ok
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.6
    • /
    • pp.152-161
    • /
    • 2014
  • This paper aims to analyze qualitative, quantitative and kinds's satisfaction of donated food of low-income users and to propose reasonable suggestions to food assistant policy. The results of analysis are as follows. First, satisfaction level of quantitative is the lowest. Second, the quantitative and kind's satisfaction level of donated foods in the demographic characteristics show generally higher satisfaction level in the case charter or lent and poor health condition. The satisfaction level of donated foods in the economic characteristics show generally higher satisfaction level in the case low cost of living and foods. In general, low-income users in harsh environments show higher satisfaction all areas. Third, the result by features and satisfaction of food donated by the impact factor analysis, food market user's satisfaction of food is high more than food bank. In order to meet needs of various users, operational bodies need to put more efforts such as diversifying promotional strategies and developing programs and local and central government should effectively formulate welfare budget to support such efforts.

A Study on User's Acceptance of Blockchain-based Copyright Distribution Platforms and Its Usage (소비자의 블록체인 기반 저작권 유통 플랫폼 수용의도와 이용행위에 관한 연구)

  • Yoo, Young-Hwan;Park, Hyeon-Suk
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.3
    • /
    • pp.59-72
    • /
    • 2019
  • Purpose - Blockchain technology, which has the characteristics of credibility, security, integrity and decentralization, has brought innovation to internet platforms that mediate peer to peer transactions, as well as changes to the contents distribution services. Blockchain-based copyright distribution platforms can solve problems which have been articulated on prior internet social networks: increased market dominance of platform business because of centralization with no reward to creators who upload on platforms, and lack of fairness, such as unfair profit distribution between the copyright holder and businesses. With this background, the current research confirmed the factors that affect the intention of usage and behaviors, targeting potential users of blockchain-based copyright distribution platforms. Research design, data, and methodology - Centered around the UTAUT2 Model, the research model was designed with 'Perceived Security' added as Construct, and 'Age' and 'Knowledge Level' added as moderating variables. For data, 607 responses were collected by an online survey, and 601 responses were included in the final analysis. We analyzed the research model and sample by using SPSS 23.0 and AMOS 23.0 on the collected responses. Results - First, results of research on whether Constructs make positive effects on Intention of use is: social influence, facilitating conditions, habit, and perceived security had positive effects on intention of use, and performance expectancy, effort expectancy, hedonic motivation, and economic value did not. Second, results of the research on whether facilitating condition, habit, and intention of use made an impact on using behaviors, it was shown that only habit and intention of use made positive effects. Third, in two groups divided by age above or under 40, group effort expectancy, intention of use, habit, and intention of use had controlling effects, and facilitating condition, intention of use, perceived security, and intention of use had effects in both groups. Conclusions - The research shows that no matter how great a blockchain-based platform is, if advantages of blockchain are not proved in various industries and utilized in real life like the internet, blockchain-based distribution systems will develop slowly. Rather than a short-term inducement emphasizing technology, there is a need for a strategic approach that can foster the environment.

The Impact of Hardware Impairments and Imperfect Channel State Information on Physical Layer Security (하드웨어왜곡과 불완전한 채널상태정보가 물리계층보안에 미치는 영향)

  • Shim, Kyusung;Do, Nhu Tri;An, Beongku
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • Physical layer security is cryptography technique to protect information by using physical nature of signals. Currently, many works on physical layer security have been actively researching while those researching models still have some problems to be solved. Eavesdropper does not share its channel state information with legitimate users to hide its presence. And when node transmits signal, hardware impairments are occurred, whereas many current researches assume that node model is ideal node and does not consider hardware impairments. The main features and contributions of this paper to solve these problems are as follows. First, our proposed system model deploys torch node around legitimate user to obtain channel state information of eavesdropper and considers hardware impairments by using channel state information of torch node. Second, we derive closed-form expression of intercept probability for the proposed system model. The results of the performance evaluation through various simulations to find out the effects on proposed system model in physical layer security show that imperfect channel state information does not effect on intercept probability while imperfect node model effects on intercept probability, Ergodic secrecy capacity and secrecy capacity.

Development of an Advanced Deformable Phantom to Analyze Dose Differences due to Respiratory Motion

  • Shin, Dong-Seok;Kang, Seong-Hee;Kim, Dong-Su;Kim, Tae-Ho;Kim, Kyeong-Hyeon;Koo, Hyun-Jae;Cho, Min-Seok;Ha, Jin-Suk;Yoon, Do-Kun;Suh, Tae Suk
    • Progress in Medical Physics
    • /
    • v.28 no.1
    • /
    • pp.1-10
    • /
    • 2017
  • The difference between three-dimensional (3D) and four-dimensional (4D) dose could be affected by factors such as tumor size and motion. To quantitatively analyze the effects of these factors, a phantom that can independently control each factor is required. The purpose of this study is to develop a deformable lung phantom with the above attributes and evaluate the characteristics. A phantom was designed to simulate diaphragm motion with amplitude in the range 1~7 cm and period up to ${\geq}2s$ of regular breathing. To simulate different tumors sizes, custom molds were created using a 3D printer and filled with liquid silicone. The accuracy of the phantom diaphragm motion was assessed by comparing measured motion with predicted motion. Because the phantom diaphragm motion is not identical to the tumor motion, the correlation between the diaphragm and tumor motions was calculated by a curve fitting method to emulate user-intended tumor motion. Tumors of different sizes were located at same position, and tumor set-up positions were evaluated. The accuracy of phantom diaphragm motion was better than 1 mm. The diaphragm-tumor correlation showed that the tumor motion in the superior-inferior direction increased with increasing diaphragm motion. The tumor motion was larger in the $10cm^3$ tumor than in the $90cm^3$ tumor. The range of difference between the tumor set-up positions was 0 to 0.45 cm. This phantom showed independently adjusting factors such as tumor size and motion to facilitate quantitative analysis of the dosimetric impact of respiratory motion according to these factors.

UE Measurement Based Compressed Mode in WCDMA (WCDMA 시스템에서 단말 측정에 의한 압축 모드 방법)

  • 김선명;장원학;조영종;임재성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7A
    • /
    • pp.814-827
    • /
    • 2004
  • The compressed mode is used to perform inter-frequency and inter-system handover in WCDMA. The instantaneous transmit power is increased in the compressed frame in order to keep the QoS(Quality of Service) unaffected by the reduced processing gain. Furthermore, since the inner loop power control is not active during the transmission gap and the effect of interleaving is decreased, a higher Eb/No target is required, which directly affects the system performance. Due to the impact on performance, the compressed mode should be activated by the RNC(Radio Network Controller) only when there is real need to execute an inter-frequency or inter-system handover. However, 3GPP does not define the method that decides the compressed mode activation. In order to reduce performance degradation, there is need the decision method. In this paper, we consider a combined cell structure in which some neighbor cells have a frequency the same as serving cell and the others have a different frequency or system. Under consideration, we analyze the effect of the compressed mode on the WCDMA forward link performance. In order to avoid performance degradation, we propose an UE(User Equipment) measurement method that can restrict the activation area of the compressed mode of UE that does not need it and evaluate its performance by simulations. Analytical results show that the use of the compressed mode affects the performance degradation. And simulation results show that proposed method leads to better performance.

An Implementation of Brain-wave DB building system for Artifacts prevention using Face Tracking (얼굴 추적 기반의 잡파 혼입 방지가 가능한 뇌파 DB구축 시스템 구현)

  • Shin, Jeong-Hoon;Kwon, Hyeong-Oh
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.1
    • /
    • pp.40-48
    • /
    • 2009
  • Leading of the computer, IT technology has make great strides. As a information-industry-community was highly developed, user's needs to convenience about intelligence and humanization of interface is being increase today. Nowadays, researches with are related to BCI are progress put the application-technology development first in importance eliminating research about fountainhead technology with DB construction. These problems are due to a BCI-related research studies have not overcome the initial level, and not toward a systematic study. Brain wave are collected from subjects is a signal that the signal is appropriate and necessary in the experiment is difficult to distinguish. In addition, brain wave that it's not necessary to collect the experiment, serious eyes flicker, facial and body movements of an EMG and electrodes attached to the state, noise, vibration, etc. It is hard to collect accurate brain wave was caused by mixing disturbance wave in experiment on the environment. This movement, and the experiment of subject impact on the environment due to the mixing disturbance wave can cause that lowering cognitive and decline of efficiency when embodied BCI system. Therefore, in this paper, we propose an accurate and efficient brain-wave DB building system that more exactness and cognitive basis studies when embodied BCI system with brain-wave. For the minimize about brain wave DB with mixing disturbance, we propose a DB building method using an automatic control and prevent unnecessary action, put to use the subjects face tracking.

  • PDF

Development of Round Trip Occurrence Simulator Considering Tooth Wear of Drill Bit (시추비트의 마모도를 고려한 라운드 트립 발생 예측 시뮬레이터 개발)

  • Lee, Seung Soo;Kim, Kwang Yeom;Shin, Hyu-Soung
    • Tunnel and Underground Space
    • /
    • v.23 no.6
    • /
    • pp.480-492
    • /
    • 2013
  • After the introduction of geothermal power generation technology based on engineering reservoir creation that can be applied on non-volcanic region, industrial need for studies on the efficient and economic execution of costly deep-depth drilling work becomes manifest increasingly. However, since it is very difficult to predict duration and cost of boring work with acceptable reliability because of many uncertain events during the execution, efficient and organized work management for drilling is not easily achievable. Especially, the round trip that discretely occurs because of the abrasion of bit takes more time as the depth goes deeper and it has a great impact on the work performance. Therefore, a technology that can simulate the occurrence timing and depth of round trip in advance and therefore optimize them is essentially required. This study divided the abrasion state of bit into eight steps for simulation cases and developed a forecast algorithm, i.e., TOSA which can analyze the depth and timing of round trip occurrence. A methodology that can divide a unit section for simulation has been suggested; while the Bourgoyne and Young model has been used for the forecast of drilling rates and bit abrasion extent by section. Lastly, the designed algorithm has been systemized for the convenience of the user.

The Moderating Role of Site Usage Experience in Internet Users' Decision on Personal Information Disclosure (개인정보제공 의사결정에 있어서 사이트 이용경험의 조절효과에 대한 연구)

  • Lee, Dong-Joo
    • Informatization Policy
    • /
    • v.19 no.2
    • /
    • pp.21-38
    • /
    • 2012
  • The proliferation of the Internet and the advent of e-commerce have amplified public concerns about privacy. Accordingly, much research effort has been made on the issue. While existing research on online information privacy has usually focused on the examination of antecedents of personal information disclosure, the literature has not paid attention to the potential changes of the antecedents' effects depending on the user's experience of the service. The current study aims to investigate the moderating role of site usage experience in Internet users' decision on personal information disclosure. Specifically, this study considers two types of antecedents of personal information disclosure on a site - the attributes of personal information requested (sensitivity and relevance of information) and the value of the service provided by the site; and examines how the effects of the antecedents on the disclosure intention are affected by the users'experience of the site. Our analysis of the data gathered through a web-based experiment reveals that site usage experience moderates the relationship between the attributes of personal information and disclosure intention. While usage experience attenuates the negative effect of information sensitivity on disclosure intention, it intensifies the positive impact that relevance of information has on disclosure intention. Based on the analysis results, we provide implications for the mitigation of the Internet users' privacy concerns as well as theoretical implications.

  • PDF

Risk based policy at big data era: Case study of privacy invasion (빅 데이터 시대 위험기반의 정책 - 개인정보침해 사례를 중심으로 -)

  • Moon, Hyejung;Cho, Hyun Suk
    • Informatization Policy
    • /
    • v.19 no.4
    • /
    • pp.63-82
    • /
    • 2012
  • The world's best level of ICT(Information, Communication and Technology) infrastructure has experienced the world's worst level of ICT accident in Korea. The number of major accidents of privacy invasion has been three times larger than the total number of Internet user of Korea. The cause of the severe accident was due to big data environment. As a result, big data environment has become an important policy agenda. This paper has conducted analyzing the accident case of data spill to study policy issues for ICT security from a social science perspective focusing on risk. The results from case analysis are as follows. First, ICT risk can be categorized 'severe, strong, intensive and individual'from the level of both probability and impact. Second, strategy of risk management can be designated 'avoid, transfer, mitigate, accept' by understanding their own culture type of relative group such as 'hierarchy, egalitarianism, fatalism and individualism'. Third, personal data has contained characteristics of big data such like 'volume, velocity, variety' for each risk situation. Therefore, government needs to establish a standing organization responsible for ICT risk policy and management in a new big data era. And the policy for ICT risk management needs to balance in considering 'technology, norms, laws, and market'in big data era.

  • PDF