• Title/Summary/Keyword: User group

Search Result 1,674, Processing Time 0.026 seconds

IT CALENDAR

  • 한국컴퓨터사용자협회
    • the USERS
    • /
    • 통권43호
    • /
    • pp.20-21
    • /
    • 2004
  • PDF

NEWS FILE

  • 한국컴퓨터사용자협회
    • the USERS
    • /
    • 통권43호
    • /
    • pp.66-71
    • /
    • 2004
  • PDF

집단효능감이 지식경영시스템 사용자의 전유과정과 만족에 미치는 영향 (The Effect of Group Efficacy on the Appropriation Process and User Satisfaction in Knowledge Management Systems)

  • 유일;김재전;노희옥
    • 지식경영연구
    • /
    • 제9권3호
    • /
    • pp.141-158
    • /
    • 2008
  • This study introduces the construct of group efficacy and combines the construct with the Adaptive Structuration Theory(AST) and user satisfaction framework. Job efficacy and IT efficacy identified as the dimensions of group efficacy are hypothesized to influence faithfulness of appropriation and consensus on appropriation. and then the user satisfaction of knowledge management systems(KMS). Data were collected through a survey of respondents who have the experience of using KMS, and analyzed by using structural equations modelling. The major findings of this study are as follows: First, job efficacy was found to have a positive influence on consensus on appropriation and user satisfaction. Second, IT efficacy was found to have a positive effect on faithfulness of appropriation and consensus on appropriation. Third, faithfulness of appropriation was found to have a positive influence on consensus on appropriation and user satisfaction. Implications of these findings are discussed for researchers and practitioners.

  • PDF

Routing Relevant Data to Group Mobile Users by Mining Social Trajectory Pattern

  • Cho, Hyunjeong;Park, Yourim;Lee, HyungJune
    • 한국통신학회논문지
    • /
    • 제38B권11호
    • /
    • pp.934-936
    • /
    • 2013
  • A routing scheme for a group of mobile users for wireless ad-hoc networks is presented. The proposed scheme mines social activity patterns from wireless traces, and exploits social user group for efficient data routing among users based on a data publish approach. Simulation results based on real-world wireless traces show that our routing scheme reduces routing cost for a large mobile user group with a factor of 1.8 compared to a baseline counterpart.

중학생에서 휴대폰의 중독적 사용 정도와 사회.심리적 특성 (Middle School Students' Addicted Use of Cellular Phone and their Psychosocial Characteristics)

  • 손현경;이해정;안숙희
    • 지역사회간호학회지
    • /
    • 제17권4호
    • /
    • pp.552-562
    • /
    • 2006
  • Purpose: This study was conducted to describe the state of middle school students' addicted use of a cellular phone and their psychosocial characteristics and to examine differences in psychosocial factors as impulsivity, stress, anxiety and classroom attitudes according to the level of addiction. Method: As the subjects of this study, 747 middle school students who use a cellular phone in B Metropolitan City were selected through stratified random sampling, and they were asked to answer a self-administered study questionnaire. Data were analyzed using frequency, descriptive statistics, $x^2-test$, t-test, and one-way ANOVA. Results Among the respondents, 15.7% fell into the addicted user group while 56.0% fell into the dependent user group and 28.3% turned out to be non-addicted users. The levels of impulsivity, stress and anxiety were higher in the addicted user group than in the dependent user group and the non-addicted user group. The addicted user group also showed a very bad learning attitude. Conclusion: Addiction to the use of a cellular phone, which may have negative influences on the users' psychosocial characteristics, needs to be detected earlier, and preventive education should be offered in order to prevent such addiction.

  • PDF

Ensuring Anonymity for LBSs in Smartphone Environment

  • Alzaabi, Mohammed;Yeun, Chan-Yeob;Martin, Thomas Anthony
    • Journal of Information Processing Systems
    • /
    • 제7권1호
    • /
    • pp.121-136
    • /
    • 2011
  • With the rapid growth of GPS-enable Smartphones, the interest on using Location Based Services (LBSs) has increased significantly. The evolution in the functionalities provided by those smartphones has enabled them to accurately pinpoint the location of a user. Because location information is what all LBSs depend on to process user's request, it should be properly protected from attackers or malicious service providers (SP). Additionally, maintaining user's privacy and confidentiality are imperative challenges to be overcome. A possible solution for these challenges is to provide user anonymity, which means to ensure that a user initiating a request to the SP should be indistinguishable from a group of people by any adversary who had access to the request. Most of the proposals that maintain user's anonymity are based on location obfuscation. It mainly focuses on adjusting the resolution of the user's location information. In this paper, we present a new protocol that is focused on using cryptographic techniques to provide anonymity for LBSs users in the smartphone environment. This protocol makes use of a trusted third party called the Anonymity Server (AS) that ensures anonymous communication between the user and the service provider.

인터넷쇼핑몰 및 사용자 유형에 적합한 e-Biz 전략 (E-Biz Strategy Based on the Types of Internet Shopping-Mall and User group)

  • 나중덕;김갑식;김승호
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제12권2호
    • /
    • pp.151-163
    • /
    • 2003
  • This research studied E-Biz strategy based on the types of internet shopping-mall and user group. This study classified types of internet user into suffer group, searcher group, and confusion group according to navigation characteristics. The types of internet shopping-mall were divided into total directed mall, total mediated mall, special directed mall, and special mediated mall. The empirical study revealed that the intention of purchase has positive relationship with the assurance of e-SERVQUAL. Mediated type shopping-mall had higher market share than directed type in the use of internet shopping-mall. Suffer group was the target market of total mediated shopping-mall. Users of this group considered importantly the trust of e-SERVQUAL. Searcher group targeted special mediated shopping-mall. They had significant consideration to the responsiveness of e-SERVQUAL. Confusion group targeted direct shopping-mall. These groups had important consideration to the assurance of e-SERVQUAL.

  • PDF

User Clustering Scheme for Downlink of NOMA System

  • Li, Li;Feng, Zhenghui;Tang, Yanzhi;Peng, Zhangjie;Wang, Lisen;Shao, Weilu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권3호
    • /
    • pp.1363-1376
    • /
    • 2020
  • An improved clustering scheme based on user group is proposed. Every two users are grouped among N-users in the allowed system according to their link gain from large to small. Each user group is numbered sequentially. Two user clusters are obtained according to the principle of maximizing link gain difference for the users in the first and last user groups. The remaining user groups are added to the two existing user clusters according to the parity of the group number. The clustering should be clustered again among the users in either user cluster if the throughput summation of a user cluster in NOMA is less than that of these users in orthogonal multiple access. The simulation results show that the proposed clustering scheme can increase the system throughput by about 8% compared with the hybrid clustering scheme when the number of users requiring service is 12.