• Title/Summary/Keyword: User Value

Search Result 1,762, Processing Time 0.032 seconds

Major Predictors of User's Continuance Intention to Provide information: In the Context of Online Community and Social Media

  • Kang, Jae-Jung;Kim, Yoo-Jung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.2
    • /
    • pp.113-122
    • /
    • 2016
  • This study investigates how anticipated value(attainment value, intrinsic value, utility value, and reward value) and self-efficacy in providing information have an influence on continuance intention to provide information in the context of online community or social media. We propose a conceptual model for examining the framework for the effect of anticipated value on attitude toward providing information, and the effect of attitude toward providing information and self-efficacy in providing information on continuance intention to provide information. Proposed research model is empirically assessed using the survey data obtained from 221 respondents in Korea. Results show that attainment value and intrinsic value have a significant impact on attitude toward providing information, whereas utility value and reward value are found to be insignificant. In addition, attitude toward providing information and self-efficacy in providing information are positively and significantly related to continuance intention to provide information.

Developing a User-Perceived Value Framework for Ubiquitous Computing (유비쿼터스 컴퓨팅에 관한 사용자 가치구조 연구)

  • Lee, Jung-Woo;Lee, Bong-Gyou;Park, Jae-Sung
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.3
    • /
    • pp.1-12
    • /
    • 2006
  • In this study, a value framework for ubiquitous computing is developed and presented. Using 'value focused thinking' approach suggested by Keeney, twenty-two potential users of ubiquitous computing were interviewed and 435 statements were obtained from these interviews. Subsequent purification and redundancy removal process reduces these 435 statements into 166 objectives users have in their mind when thinking about ubiquitous computing. These 166 objectives were again simplified into 37 objectives by clustering. Through a focus group interview, these objectives were again classified into a means-ends network diagram by analyzing reciprocal relationships among them. Resulting means-ends network reveals the value framework inherent within the perception of users. This framework will be useful as a reference in developing new business models in ubiquitous computing as well as developing technologies themselves.

  • PDF

A Case Study on the Students' Attitude toward User-Created Contents in Discretionary Classes of Elementary School (UCC 활용교육에 관한 학습자 태도 연구 - 초등학교 재량교육 사례를 중심으로 -)

  • Choi, Soo-Myung;Yoo, Young-Soon;Kim, Tae-Ung
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.4
    • /
    • pp.21-31
    • /
    • 2011
  • User-created content(UCC) is on the rapid increase both in terms of quantity and the quality of sharing and enjoying each others. However, not much research has been done on school's adoption of this innovative contents for educational purposes. The aim of this case study is to identify the determinants of students' attitude toward using UCC in elementary school classes. This study employs the perceived educational value, ease of use, social influence, fun, computer self-efficacy, cooperativity and concentration as the antecedents of attitude, and collected 246 survey responses from 5th and 6th grade students. The results indicate that the perceived educational value, ease of use and socal influence have significant impact on the attitude toward using UCC. It was also found that the cooperativity, fun and ease of use determine the level of perceived educational value, and that the computer self-efficacy, fun and concentration influence the perceived ease of use. Some useful suggestions, concerning the utilizing UCC for educational purpose in elementary school classes, are also presented.

  • PDF

A Behavior-based Authentication Using the Measuring Cosine Similarity (코사인 유사도 측정을 통한 행위 기반 인증)

  • Gil, Seon-Woong;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.17-22
    • /
    • 2020
  • Behavior-based authentication technology, which is currently being researched a lot, requires a long extraction of a lot of data to increase the recognition rate of authentication compared to other authentication technologies. This paper uses the touch sensor and the gyroscope embedded in the smartphone in the Android environment to measure five times to the user to use only the minimum data that is essential among the behavior feature data used in the behavior-based authentication study. By requesting, a total of six behavior feature data were collected by touching the five touch screen, and the mean value was calculated from the changes in data during the next touch measurement to measure the cosine similarity between the value and the measured value. After generating the allowable range of cosine similarity by performing, we propose a user behavior based authentication method that compares the cosine similarity value of the authentication attempt data. Through this paper, we succeeded in demonstrating high performance from the first EER of 37.6% to the final EER of 1.9% by adjusting the threshold applied to the cosine similarity authentication range even in a small number of feature data and experimenter environments.

Rethinking Social Media: The Influences of Restrictive Attributes of Audio-based Social Media on User Intention (SNS의 재발견: 오디오SNS의 제한적 속성이 사용의도에 미치는 영향)

  • Cho, Yeram;Lee, Jeha;Park, Haeun;Chung, Doohee
    • Journal of Technology Innovation
    • /
    • v.29 no.4
    • /
    • pp.125-160
    • /
    • 2021
  • Unlike existing social platforms that seek openness, an audio-based social platform is characterized by its limitations. This study uses the Value-Based Acceptance Model(VAM) to analyze the role that such limitations play in the user's acceptance of audio-based social media. In this study, restrictive properties are defined as access-limitation, communication-limitation, and content-limitation. This study aims to analyze the effect of each variable on the perceived value and usage of audio-based social media. The hypothesis test was conducted based on the survey responses total of 207 users and potential users. The results was analyzed that three limiting variables affect perceived benefit factors, usefulness and playfulness, and the user's acceptance intention. This study is significant in that it presents a model based on the VAM and provides guidance for new forms of social media growth.

Influence of Perceptual Recognition and User Characteristics of 3D Printer Consumers on Perceived Value and Intent to Use Continuously (3D프린터 소비자의 지각된 인식과 사용자 특성이 지각된 가치와 지속사용 의도에 미치는 영향)

  • Park, Jun-Hong;Lee, Junsang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.6
    • /
    • pp.697-703
    • /
    • 2019
  • This study looked at what the perceived recognition and user characteristics of 3D printers have to do with perceived value and intention of continuing use. The data collection was conducted by 300 people, including employees who lived in Korea and used 3D printers. Research has shown that firstly, perceptual perception affects perceived values and intended use. Second, user characteristics have been shown to affect perceived value and intended use. Third, it appears to have a positive effect on perceived values and the intention of continuous use. Therefore, by fully recognizing the usefulness and ease of 3D printers to consumers, and by making them aware of the convenience and reliability of consumers, it will be effective if a strategy is established that has put a lot of interest and effort into making 3D printers more popular and active by enhancing consumers' intention to continuously use 3D printers.

A Study on Influencing Factors on User's Adoption Resistance to Personal Cloud Computing Service (개인용 클라우드 컴퓨팅 서비스 수용저항에 영향을 미치는 요인에 관한 연구)

  • Jo, In-Jea;Kim, Sun-Kyu;Yang, Sung-Byung
    • Knowledge Management Research
    • /
    • v.16 no.1
    • /
    • pp.117-142
    • /
    • 2015
  • Recently, the personal cloud computing service has been being spotlighted as an individual tool of productivity enhancement. However, compared to the rosy forecast, its diffusion rate in the domestic (Korean) market is much slower than expected. In order to find the reason for the slow growth of personal cloud computing service, we attempt to identify influencing factors on user's adoption resistance, while most prior research has focused on the factors affecting its adoption. Based on both the person-technology fit model and the privacy calculus model, we propose technostress and perceived value as key antecedents of adoption resistance. In addition, we identify (1) technical (pace of change and complexity) and personal (self-efficacy) influencing factors on technostress, and (2) beneficial (perceived mobility and perceived availability) and harmful (perceived vulnerability) influencing factors on perceived value. To validate our research model, 133 individual samples were gathered from undergraduate and graduate students who had actual experience of using at least one of personal cloud computing services. The results of the structural equation modeling confirm that both technostress and perceived value have significant effects on adoption resistance, but they have different influencing mechanisms to different types of adoption resistance (indifference, postponement, and rejection). Theoretical and practical contributions are discussed in the conclusion.

Adaptive User Profile for Information Retrieval from the Web

  • Srinil, Phaitoon;Pinngern, Ouen
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1986-1989
    • /
    • 2003
  • This paper proposes the information retrieval improvement for the Web using the structure and hyperlinks of HTML documents along with user profile. The method bases on the rationale that terms appearing in different structure of documents may have different significance in identifying the documents. The method partitions the occurrence of terms in a document collection into six classes according to the tags in which particular terms occurred (such as Title, H1-H6 and Anchor). We use genetic algorithm to determine class importance values and expand user query. We also use this value in similarity computation and update user profile. Then a genetic algorithm is used again to select some terms from user profile to expand the original query. Lastly, the search engine uses the expanded query for searching and the results of the search engine are scored by similarity values between each result and the user profile. Vector space model is used and the weighting schemes of traditional information retrieval were extended to include class importance values. The tested results show that precision is up to 81.5%.

  • PDF

A Study on the Ethical Issues and Sharing Behavior of User's Information in the Era of Big Data

  • Lee, Myung-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.43-48
    • /
    • 2016
  • This study is to examine how big data collects user's information and is used; the status quo of exposures of user's information, and various measures of self-control by the user. This study is also to look their ethical issues and discuss problems of privacy concerning big data. As a way for users to self-control their information, they need to check the log-in state of web portal sites and set up their account so that customized advertisement and location information cannot be tracked. When posting a blog, the value of posting should be controlled. When becoming a member of a web site, users must check the access terms before agreement and beware of chained agreements and/or membership joins in order to control the exposure of their personal information. To prevent information abuse through big data through which user's information is collected and analyzed, all users must have the right to control, block or allow personal information. For an individual to have the right to control over his information, users must understand the concept of user's information and practice ethics accompanied by newly given roles in the Internet space, which will lead to the establishment of the sound and mature information society on the Internet.

A Study on User-Generated Metadata (이용자 생성 메타데이터에 관한 연구)

  • Lee, Jae-Yun;Hwang, Hye-Kyong
    • Journal of Information Management
    • /
    • v.37 no.3
    • /
    • pp.1-24
    • /
    • 2006
  • As the amount of information through growing Internet has dramatically increased recently, information professions generated metadata has been reached the limits of their role. Based on the value of information depends on the user, user generated metadata is a growing paradigm in the field of information organization today. This paper firstly introduces the concepts of user-generted metadata, and then examines the cases of user annotation and user tagging. Finally we discuss the effects and implications of user-generated metadata on the development of digital libraries.