• Title/Summary/Keyword: User level

Search Result 2,655, Processing Time 0.028 seconds

The Relationships between Information Systems Implementation Performance and User Attitude, User Education and Training - Focused on Corporation D - (사용자 태도 및 교육훈련과 정보시스템 실행 성과간의 관계 - D사를 중심으로 -)

  • Lee, Jong-Koo;Lee, Dong-Man;Chang, Myung-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.1 no.1
    • /
    • pp.70-85
    • /
    • 1998
  • This study intends to identify the effects of user attitude, user education & training on the information systems implementation performance. In order to obtain data, survey questionnaires were distributed to the users of 'D' company, the major findings can be summarized as follows. First, it's suggested from the analyses that user attitude and user education & training independently have statistically significant effects on information systems implementation performance. Second, it's revealed that even though the interaction effects by both user attitude and user education & training have positive effects on the level of usage, but have no statistically significant effects on satisfaction level. Based on these results, it's recommended to convert user attitude favorably toward user environment and to increase the level of user education & training, in order to promote information systems implementation performance. Especially, differentiated user education & training are highly recommended.

A study of influence factor on Mobile Game Heavy User - focused on Game User Properties (모바일 게임 중이용자 영향요인에 관한 연구 - 게임 이용자 속성을 중심으로)

  • Kim, Hye Bin;Park, Young Il
    • Journal of Digital Contents Society
    • /
    • v.16 no.3
    • /
    • pp.493-501
    • /
    • 2015
  • This study is to observe the correlation between user properties and user behavior on the mobile game, one of the most prominent digital contents with the most mutual interaction. Among various factors affecting on behaviors of game users, the user properties itself was accentuated, and the effect of individual and psychological quality on the use of game was evaluated. The user properties were mainly categorized into five factors of "interpersonal relationship", "level of game skill", "inclination of innovation", "self-esteem", and "competitive spirit", and the use behavior of game was categorized mainly into two types - quantitative behavior of "amount of use (time of use, consumption cost)" and qualitative behavior of "perceived satisfaction level (perceived enjoyment, perceived service quality, and perceived price)". As a result of study, in general, as the user quality subjected in this study is stronger, the amount of use and satisfaction level are higher. This study is to observe what type of user qualities leads to the more use, consumption, and satisfaction level of game contents to contribute to the study about the use of conventional digital contents and heavy use.

Perception and Evaluation of Quality of Hospital Information System (병원정보시스템 품질에 대한 인식 및 평가)

  • Lim, Jung-Do
    • The Korean Journal of Health Service Management
    • /
    • v.8 no.1
    • /
    • pp.1-13
    • /
    • 2014
  • The purpose of this study is to investigate the perception of quality property of hospital information system, the quality level, and its effects. The participants were 730 employees who are using hospital information system in hospitals. In order to analyze the relationship, the quality property regulates the consideration of user's taste and the state of user's favor for the design of hospital information system, and the quality level regulates user's convenience and properness. The main results from this study can be summarized as follows, First, the perception of quality property for hospital information system showed few significance level between occupation, but revealed significance level between position. The evaluation of quality level showed significance level depending on the occupation and position. Second, quality property which generally affects to the quality level of the hospital information system were different between types of occupation and quality factor.

Designing on Security zone to improve Cookie File Security level (쿠키파일의 보안성을 향상하기 위한 보안영역 설계)

  • Seo, Hee-Suk;Choi, Yo-Han
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.6
    • /
    • pp.75-81
    • /
    • 2011
  • Cookie is simple text file, which contains records of web service which provided to user. some of data included in Cookie has user's private information. When attacker has Cookie which included user's private information, will causing financial losses. In this paper we designed security section which can improve vulnerable Cookie's security level. Through research and vulnerability analysis of Cookie file, we find out how to implement security area to offer efficient security area and design security area for cookie file. Also we checked security level to performance evaluation. Through this security level, we can keep user's private information secure using Cookie's improve security level which stored in user's personal computer.

  • PDF

The Effects of User attitude and Expectation on the System performance according to Management level of Information System (시스템의 관리수준에 따라 태도와 기대가 성과에 미치는 영향)

  • Han, Kyung-Il
    • Journal of Digital Convergence
    • /
    • v.5 no.1
    • /
    • pp.91-100
    • /
    • 2007
  • The purpose of this study is to confirm whether user attitude and expectation make a significant difference on the system performance according to management level of IS. The management level is defined as a evaluation of IS and project management. Field research was employed to empirically investigate the relationship among the variables. The finding of the study can be summarized as follows. The positive attitude has a favorable effect on the system performance. But high expectation shows low performance under the strict evaluation.

  • PDF

A Study on Factors for the User's Satisfaction of the a-Trade Service System (전자무역서비스 시스템의 사용자 만족 요인에 관한 연구)

  • Shin, Seung-Man;Jeong, Yoon-Say
    • International Commerce and Information Review
    • /
    • v.10 no.3
    • /
    • pp.117-140
    • /
    • 2008
  • The purposes of the study are to measure the relative importance of independent variables, to analyze relation between user satisfaction and use, and to improve the level of user satisfaction in using e-Trade system(uTradeHub). The study develops the independent variables in three dimensions(i.e the quality of system, quality of information, and quality of service), estimates the level of satisfaction on a par with these variables, and analyzes the causal relation of these variables. The major findings of the study are as follows. First, there is a significant casual relationship between the quality of system and user satisfaction, thus the hypothesis is accepted. Second, there is a significant casual relationship between the quality of information and user satisfaction, thus the hypothesis is accepted. Third, there is a significant casual relationship between the quality of service and user satisfaction, thus the hypothesis is accepted. Final, there is a significant casual relationship between the user satisfaction and use, thus the hypothesis is accepted.

  • PDF

Factors Affecting User´s Satisfaction in Development of Natural Recreation Forest (자휴양림의 개발요소가 이용만족도에 미치는 영향)

  • 장병문
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.29 no.3
    • /
    • pp.19-28
    • /
    • 2001
  • The purpose of this paper is to examine factors affecting user´s satisfaction in development of natural recreation forest(NRF) in order to answer the research question: What is the magnitude of factors affecting user´s satisfaction in development of NRF. After reviewing the literature, mechanism of outdoor recreation, and development factors in NRF, we constructed the conceptual framework and have formulated the hypothesis of this research. we have obtained data through a questionnaire, which surveyed 625 visitors at 10 of the 72 natural recreation forests in Korea in 1999, We have analyzed the data using the mean difference test, Pearson´s correlation analysis, and multiple linear regression method. We found that 1) all the development factors except recreational resources affecting user´s satisfaction have turned out to be statistically significant at one percent level. The direction of relationship between independent variable and dependent variable is the same as that of dependent variable. 2) in bivariate analysis, the relationships between user´s satisfaction and all the development factors are fairly high and statistically significant. The higher the value of development factors, the higher the degree of user´s satisfaction. 3 in multivariate analysis, such variables as the suitability of activities level of services, atmosphere, and facility have been statistically significant at one percent level, and 4) Their relative contribution of the suitability of various recreational activities, level of atmosphere, and service on dependent variable have been turned out to have 8.167, 4.889, 3.333, and 1.611 times more importance than that of the suitabity of recreational resources, respectively. The research results suggest that a guideline for the creation of marketable NFR and development of use-programs and recreational atmosphere be recommended in the planning and development process of NRF, and excessive investment on facilities is not desirable. The approach and analysis method adopted by this research is highly useful for an evaluation criterion of NRF and development of devices for increasing user´s satisfaction in NRF. It is recommended that more empirical study on individual factors affecting user´s satisfaction be performed in the future.

  • PDF

User Transparent File Encryption Mechanisms at Kernel Level (사용자 투명성을 갖는 커널 수준의 파일 암호화 메카니즘)

  • Kim Jae-Hwan;Park Tae-Kyou;Cho Gi-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.3-16
    • /
    • 2006
  • Encipherment in existing OS(Operating Systems) has typically used the techniques which encrypt and decrypt entirely a secret file at the application level with keys chosen by user In this mechanism it causes much overhead on the performance. However when a security-classified user-process writes a secret file, our proposed mechanism encrypts and stores automatically and efficiently the file by providing transparency to the user at the kernel level of Linux. Also when the user modifies the encrypted secret file, this mechanism decrypts partially the file and encrypts partially the file for restoring. When user reads only the part of the encrypted file, this mechanism decrypts automatically and partially the file. Therefore our proposed mechanism provides user much faster enciphering speed than that of the existing techniques at the application level.

Context based User Required Services Reasoning Model (상황 정보 기반 사용자 요구 서비스 추론 모델)

  • Ko, Kwang-Enu;Sim, Kwee-Bo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.1
    • /
    • pp.21-26
    • /
    • 2008
  • It was already realized at a current technological level of home network systems that the systems recognizes a user's simple order and carry out the order in the ubiquitous computing environment. However home is not a simple environment consisting into a large number of family members, so various order and situation would be needed accordingly. From now on we need to reach the technological level to infer that how is the user's behavior patterns and what kinds of service is the fittest to user who belong to the ubiquitous computing environment by using the result of the context interpreter. In this regards, active inferred-model needs to be suggested upgrading user's command into one step more higher level than the simple one adapting diversified feature. This study would like to suggest this active model recognizing context, which is user's environmental information applying basic network and inferring Context-based Service that user wants through the recognized result This study proposes a new method that can infer the user's desire in ubiquitous computing environment. First of all, we define a context as user's information of ubiquitous computing environment situation that user belongs to and we classify the context into 4W1H(Where, Who, When, What) formats. We construct Bayesian network and put the factor of context use as Bayesian network nodes. As a result, we can infer the user's behavior pattern and most proper service for user in the intelligent space from the probabilistic result of Bayesian network.

Joint Subcarrier and Bit Allocation for Secondary User with Primary Users' Cooperation

  • Xu, Xiaorong;Yao, Yu-Dong;Hu, Sanqing;Yao, Yingbiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3037-3054
    • /
    • 2013
  • Interference between primary user (PU) and secondary user (SU) transceivers should be mitigated in order to implement underlay spectrum sharing in cognitive radio networks (CRN). Considering this scenario, an improved joint subcarrier and bit allocation scheme for cognitive user with primary users' cooperation (PU Coop) in CRN is proposed. In this scheme, the optimization problem is formulated to minimize the average interference power level at the PU receiver via PU Coop, which guarantees a higher primary signal to interference plus noise ratio (SINR) while maintaining the secondary user total rate constraint. The joint optimal scheme is separated into subcarrier allocation and bit assignment in each subcarrier via arith-metric geo-metric (AM-GM) inequality with asymptotical optimization solution. Moreover, the joint subcarrier and bit optimization scheme, which is evaluated by the available SU subcarriers and the allocated bits, is analyzed in the proposed PU Coop model. The performance of cognitive spectral efficiency and the average interference power level are investigated. Numerical analysis indicates that the SU's spectral efficiency increases significantly compared with the PU non-cooperation scenario. Moreover, the interference power level decreases dramatically for the proposed scheme compared with the traditional Hughes-Hartogs bit allocation scheme.