• Title/Summary/Keyword: User adoption

Search Result 317, Processing Time 0.029 seconds

An Empirical Study on Intentions to Use of Smart TV (스마트 TV 이용의도에 관한 실증 연구)

  • Lee, Dong-Gun;Lee, Sang-Joon;Choi, Beom-Jin
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.107-118
    • /
    • 2012
  • Smart TV is expected to take the center stage of the recent "smartization" trend in IT and consumer electronics as it performs a hub for various smart IT devices, such as smart phone, smart pad, PC, etc. It is distinct from traditional TVs or even IPTVs in the sense that it provides immersive and interactive experiences via apps downloaded through TV app store. Smart TV could serve as a new intermediary device between other smart devices and the Internet. While it started experiencing a rapid growth, little research has been conducted to understand this emerging technology in terms of its user acceptance and adoption by users. The current research attempts to fill the gap in the field by examining factors and processes for this new technology to be adopted by users. This paper draws on theories of IT acceptance and use, such as the "Unified Theory of Acceptance and Use of Technology", to investigate factors affecting "intention to use" of smart TV. The proposed research model is analyzed using the structural equation modeling approach. Findings show that such factors as innovativeness, switching cost, switching benefit, service interface, and user interface affect users' intention to use smart TV, through effort expectation, performance expectation, and social influence. Theoretical and managerial implications are discussed.

Performance Evaluation of Common Feedback Channels for Multicast Transmission and Optimization of System Parameters (멀티캐스트 전송을 위한 공용 피드백 채널의 성능 분석 및 파라미터 최적화 설계 방법)

  • Jung, Young-Ho;Kim, Byung-Gun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5B
    • /
    • pp.489-497
    • /
    • 2009
  • In the 3GPP LTE and IEEE 802.16m standardizations for IMT-Advanced, the efficient transmission of multicast and broadcast data is one of the important issues to improve system performance. Especially, to guarantee each user's QoS in the multicast group, H-ARQ or adaptive modulation are considered to be adoption, however, reduction of feedback overhead is one of the most important issues. In this paper, performance of the previously proposed OOK (On-Off Keying) based common ACK/NACK feedback channel is analyzed through theoretical analysis and simulation. Based on the results, system parameter optimization methods for common feedback channel are proposed. In addition, through computer simulation, it is shown that the common feedback method according to the proposed feedback parameter optimization can feedback ACK/NACK information for multicast H-ARQ transmission, more reliably than the conventional user dedicated feedback method in 3GPP LTE systems, and can reduce the feedback overhead as well.

Understanding Electric Vehicle Consumer in Korea Market Based Upon User and Prospective Survey (국내 전기자동차 수요층 분석: 초기 구매자와 일반 소비자 조사를 토대로)

  • Park, Jiyoung;Kim, Haegon;Kim, Chansung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.6
    • /
    • pp.191-201
    • /
    • 2019
  • This study aims at understanding the fundamental characteristics of EV consumer based upon user survey and understanding the challenges to promote EV adoption in Korea. Data are obtained from two different surveys. One asked 304 EV buyers in Korea and another asked 905 prospective customer about EV awareness and perception, EV purchase intention, and etc. Analysis is composed of two parts; one is about the general characteristics and purchase intention of general consumers; another is about the intent to repurchase EV owners. We discuss the policy implications to expand EV demand in Korean market based on two purchase and repurchase logit models.

IAM Architecture and Access Token Transmission Protocol in Inter-Cloud Environment (Inter-Cloud 환경에서의 IAM 구조 및 액세스 토큰 전송 프로토콜)

  • Kim, Jinouk;Park, Jungsoo;Yoon, Kwonjin;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.573-586
    • /
    • 2016
  • With the adoption of cloud computing, the number of companies that take advantage of cloud computing has increased. Additionally, various of existing service providers have moved their service onto the cloud and provided user with various cloud-based service. The management of user authentication and authorization in cloud-based service technology has become an important issue. This paper introduce a new technique for providing authentication and authorization with other inter-cloud IAM (Identity and Access Management). It is an essential and easy method for data sharing and communication between other cloud users. The proposed system uses the credentials of a user that has already joined an organization who would like to use other cloud services. When users of a cloud provider try to obtain access to the data of another cloud provider, part of credentials from IAM server will be forwarded to the cloud provider. Before the transaction, Access Agreement must be set for granting access to the resource of other Organization. a user can access the resource of other organization based on the control access configuration of the system. Using the above method, we could provide an effective and secure authentication system on the cloud.

A Study on the Moderating Effect of Perceived Voluntariness in the Organizational Information System Usage and Performance (정보시스템 사용과 성과에 있어서 자발성의 조절효과에 관한 연구)

  • Lee, Seung-Chang;Lee, Ho-Geun;Jung, Chang-Wook;Chung, Nam-Ho;Suh, Eung-Kyo
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.195-221
    • /
    • 2009
  • According to an industry report, a large number of organizations have invested in Organizational Information System(OIS) in the past few years. Several research results indicate that successful investments in OIS lead to productivity enhancement, while failed ones result in undesirable consequences such as financial losses and dissatisfaction among employees. In spite of huge investments, however, many organizations have failed in achieving the hoped-for returns from OIS. Thus, understanding user acceptance, adoption, and usage of new IS(Information Systems) is an important issue for IS practitioners. Indeed, study of the user acceptance of new information system has been one of the most important research topics in the contemporary IS literature. Several theoretical models are tested to examine 'user acceptance' and 'usage behavior' in IS context. While many research models incorporate 'ease of use' or 'usefulness' as important factors in explaining user acceptance, Technology Acceptance Model(TAM) has been one of the most widely applied models in user acceptance and usage behavior. Even in recent IS studies that employ theories of innovation diffusion in the area of IS implementation, a major focus has been on the user's perception of information technologies. In this research, we study 'voluntariness' as an important factor in IS acceptance by users. Voluntariness is defined as "the degree to which the use of the innovation is perceived as being voluntary, or of free will" When examining the diffusion of accepting OIS, a thoughtful consideration should be given to 'perceived voluntariness.' Current article has following research questions: 1) What models are appropriate to explain the success of OIS? and 2) How does the 'voluntariness' affect the success of OIS? In order to answer these questions, a research model is proposed to describe the detailed nature of association among three independent variables (IT usage level, task interdependency, and organizational support), a mediating variable (IS usage), a dependent variable (perceived performance), and a moderating variable(perceived voluntariness). The central claim of this article is that organizations hardly realize expected returns from OIS investments unless perceived voluntariness is effectively managed after operating OIS. As an example of OIS in this study we have selected the Intranet of Republic of Korea Air Force (ROKAF). ROKAF has implemented the Intranet in an attempt to improve communication and coordination within the organization. To test our research model and hypotheses, survey questionnaires were first sent out to 400 Intranet users. With the assistance of ROKAF, Intranet users were initially identified among its members, and subjects were randomly drawn from the pool. 377 survey responses were finally returned. The unit of measurement and analysis in this research is a personal level. Path analysis based on structural equation modeling was used to test research hypotheses. Construct validity represents accordance between the theoretical base concept of constructs and its measurement items. Tests for the reliability and discriminant validity are accepted, thus verifying our survey instrument. In this research, we have proposed a conceptual framework to highlight the importance of perceived voluntariness after organization deploys OIS. The results of our analysis present several key finding. First, all three independent variables (IT usage level, task interdependency, and organizational support) have significant effects on IS usage, which will eventually improve performance. Thus, IS usage plays a mediating role between antecedent variables (IT usage level. task interdependency, and organizational support) and performance improvement. Second, the effect of the task dependency was the highest for IS usage among the three antecedent variables. This is highly plausible since one of the Intranet's major capabilities is to facilitate communication among members within an organization. Accordingly, we conclude that the higher the task dependency, the higher Intranet usage. The effect of user's IT usage level was the second, while the effect of the organizational support was the third. Finally, the perceived voluntariness plays a pivotal role in enhancing perceived performance in personal level after launching the Intranet. Relationships among investigated variables were significantly different between groups with a high level and a low level of voluntariness. The impact of the Intranet usage on the performance was greater in the higher level voluntariness group than in the lower one. For the lower level voluntariness group, the user's IT usage had the highest effect on the Intranet usage among the three antecedent variables. In short, our study suggests that the higher the perceived voluntariness is the more IS usage will be. Perceived voluntariness was found to have a moderating effect on the relationships among user IT usage level, task interdependency, IS usage, and perceived performance, supporting all the hypotheses on the moderating effect. Most of all, user IT usage level has the strongest influence on IS usage, indicating that users with superior IT usage are more likely to enjoy a high level of perceived performance.

A Study on the Effect of Turnover Intention by Psychological Commitments in Mandatory Environments : Focused on the Accounting Information Systems' Users (비자발적 환경하에서 사용자의 심리적 몰입이 이직의도에 미치는 영향에 관한 연구 : 회계정보시스템 사용자를 중심으로)

  • Chang, Won-Kyung;Kim, Tae-Kyun
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.1
    • /
    • pp.179-202
    • /
    • 2007
  • This paper presents and tests a conceptual model of Technology Acceptance Model (TAM) that explains perceived usefulness, perceived ease of use, organizational commitment and turnover intention in terms of psychological commitments in mandatory environments. The model focuses on the psychological commitments (Kelman's internalization, Identification, compliance) as the primary predictors of perceived usefulness, perceived ease of use and organizational commitment. We discuss our current understanding of technology acceptance as well as the notion of mandated use. The results are as fellows that organizational commitment is negatively related to turnover intention : perceived usefulness is positively related to organizational commitment : psychological commitments are positively related to organizational commitment, perceived usefulness and perceived ease of use : perceived ease of use is positively related to perceived usefulness in mandatory environments. Through this research, psychological commitments are the strong determinants of technology acceptance in mandatory environments. These findings advance theory and contribution to the foundation for future research aimed at Improving our understanding of user adoption behavior in mandatory environments.

  • PDF

A Comparative Study on Models of Web-based Information Seeking Behavior (웹 정보탐색행위 모형의 비교 분석 연구)

  • 김성진
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.2
    • /
    • pp.211-233
    • /
    • 2004
  • The web is a new information environment, which has different characteristics from a traditional IR environment. Needed are more research from a new point of view as well as the adoption of a new research paradigm in order to understand a user-system interaction on the web. The purpose of this study is to review and analyze models of web-based information seeking behavior, which Wang, Hawk & Tenopir, Hsieh-Yee, Choo, Detlor & Turnbull, Chun & Cooper, Rieh, and Spink proposed. The comparative analysis indicates that web-based information seeking models are categorized into three area: interaction model, information seeking behavior model, and evaluation model, and that they are based on a multifaceted interaction and a nonlinear perspective.

A Study on the Direction of Ubiquitous Office with a Focus on Work Services (업무유형에 따른 유비쿼터스 오피스 계획 방향에 관한 연구)

  • Cho, Myung Eun;Chae, Hee Hwa;Lee, Ju Hyun;Kim, Mi Jeong
    • Korean Institute of Interior Design Journal
    • /
    • v.21 no.2
    • /
    • pp.186-196
    • /
    • 2012
  • Information technology has changed the human life as well as the societal and economic paradigm. New office environments have been proposed to cope with emerging changes and to support working performances by reducing costs of office operation and business. Recently, office environments have adopted ubiquitous computing with a focus on collaboration to promote real-time enterprises. They become equipped with various mobile devices and pervasive technologies in wireless networks. This study aims to propose a direction for the adoption of mobile and pervasive computing on the new office environment. We investigate relate works and analyze new office types including mobile offices, telework centers and home offices. Using a customized questionnaire, the current conditions of the office environments and officers' demands were investigated and analyzed. In the end, we propose the direction for a ubiquitous office environment with a focus on two attributes, ubiquity and mobility. This research will be a basis for the development of ubiquitous offices that support the professionalism of works in practices.

  • PDF

A Study of Countermeasure against Security Risk of Fintech Services for Financial Innovation (금융혁신을 위한 핀테크 서비스의 보안 리스크 대응방안 연구)

  • Park, Jeong-Kuk;Kim, Injai
    • Knowledge Management Research
    • /
    • v.16 no.4
    • /
    • pp.35-45
    • /
    • 2015
  • Fintech, which means the convergence of finance and information technology, becomes a hot topic in the financial sector. Through innovative activities on financial services, ICT(Information and Communication Technology) is integrated into the overall financial industry, and a new form of financial services could be expected to improve the existing financial system. On the other hand, fintech services are relatively vulnerable to security issues. Due to the process simplication and the channel fusion, the leakage of personal and financial informations, authentication bypass, phishing, and pharming are getting more concerned. In this study we investigated the security risk of fintech services in the viewpoints of service provider, technology adoption, and security policy. The possible countermeasures to reduce those risks are suggested because security is an important criterion for selecting financial services. This study basically offers quantification of the potential security risks and step-by-step control measures about business processes in the fintech services. The suggested security model includes user authentication, terminal security, payment information protection, API(Application Programming Interface) security, and abnormal transaction monitoring. This study might contribute to an understanding of the security risks and some possible measures for mitigating those risks on the practical perspective.

Moderation Effects of Computer Self-efficacy on the Relationship among Variables for Appropriation in using IT (정보기술 사용 전유에 관한 변수들 간의 관계에서 컴퓨터자기효능감의 조절효과)

  • Lee, Woong-Kyu
    • The Journal of Information Systems
    • /
    • v.18 no.1
    • /
    • pp.25-46
    • /
    • 2009
  • According to adaptive structuration theory, faithfulness of appropriation(FOA), and consensus on appropriation(COA) are variables for measuring appropriation in use of IT. FOA is the level of interpreting and using the intentions of the IT designers objectively and COA is the level of agreement on ways of using IT among or with user group independently of designers' intention. In traditional theories of IT adoption, computer self-efficacy(CSE), self evaluation on abilities of using computer, has been considered as one of the important individual differences. which would influence on beliefs of using IT. Therefore, considering the relationship among CSE, FOA, COA and attitude, we can hypothesize that CSE would play a moderation varaible among appropriation related variables relationships, FOA-attitude and COA-attitude. The objective of this study is an analysis of CSE's moderation effects in causality relationship among appropriation measuring variables. For this purpose, we propose a research model where there are four hypotheses for moderation effects of CSE on the relationships between appropriation variables. We test these hypotheses by sampling ERP and groupware users. In result, our proposed hypotheses except moderation effect of COA-usefulness are accepted. Main contribution of this study is to identify the relationship between CSE and AST. This study implies that very careful consideration of users' CSE is necessary in order to perform managerial activities based on FOA and COA in IT management department.