• Title/Summary/Keyword: mobile users

Search Result 2,985, Processing Time 0.029 seconds

A Study on the Development Direction of Specialized Library in Road Traffic Field (도로교통분야 전문도서관 발전방향 모색에 관한 연구)

  • Kwak, Seung-Jin;Noh, Younghee;Chang, Inho;Ko, Jae Min
    • Journal of Korean Library and Information Science Society
    • /
    • v.53 no.2
    • /
    • pp.73-94
    • /
    • 2022
  • This study is a basic research for establishing a mid- to long-term development plan for the library of the Korea Expressway Corporation that can establish the vision and core values of the library and continuously grow by taking advantage of the specialization of the road transportation field in preparation for the 4th industrial revolution and post-corona era. The current state, satisfaction, and demand of the library were conducted for users of the Korea Expressway Corporation, and based on this, a mid- to long-term development plan was proposed. As a result of the research, first, the library of the Korea Expressway Corporation should provide information services to respond to the immediate information needs of its members as a library that supports academic and research activities as well as the comprehensive collection and preservation of related materials as a national road transportation representative library. Second, it is necessary to establish a systematic collection development policy, and it is necessary to collect collections by detailed themes related to road traffic. Third, overall service development is necessary, and Korea Expressway Corporation library homepage and mobile service should be developed. Lastly, space improvement must be made through space reorganization, and it is necessary to expand the usability through the introduction of the latest technology.

A Study on the Motivation to Choose a Major and Satisfaction with Social Media Usage in Dental Hygiene Freshman (일부 치위생과 신입생의 학과 선택 동기와 학과 SNS 이용 만족도에 관한 연구)

  • Sung-Yeon, Jang;Hyoun-Kyoung, Oh
    • Journal of Korean Dental Hygiene Science
    • /
    • v.5 no.2
    • /
    • pp.97-104
    • /
    • 2022
  • Background: Due to the declining number of students preparing for university entrance exams , the quota of universities has been decreasing continuously. This situation became increasingly diverse as new media used online, mobile, and PR tools to continuously invite students. This study is aimed at offering the helpful data to plan an effective PR strategy by analyzing the correlation between the major selection and satisfaction of the department's social media usage among freshmen majoring in dental hygiene. Methods: The collected data from the self-reported survey with freshmen were analyzed using the SPSS 22.0 program. The survey items were motive to select the major, social media platform that subjects used, reasons to use the media, time to visit the department's social media platform, and satisfaction level on the department's social media platform, using a 5-point Likert Scale. Results: The reasons for choosing a major were given by 32.2% and 15.9% respondents, respectively, as the vision after graduation and practice facilities. 39.9% and 31.4% used Instagram and YouTube for social media platforms, respectively, for using social media platform; 26.9% and 26.3% visited the department's social media before and after entering the university, respectively; 46.4% and 24.9% used Instagram and YouTube for department social media; and they generally satisfied with the contents of the department's social media. 40.9% of them said that information from the department's social media was useful. 33.8% of them said the information from the department's social media exceeded their expectations. 46.8% of them answered that the department's social media made the department's image positive. 33.4% got interested in the major more due to the department's social media. According to 32.1% of respondents, the department's social media was helpful in deciding on a major. With 35.4%, a positive correlation was discovered between the department's practice facilities and satisfaction on the department's social media. Conclusion: It is thought that the department's social media should try continuously by uploading the contents to meet the users' needs on a regular basis and seeking the plans to be able to collect various opinions using surveys through the related social media so that students can select the major and, moreover, lead the positive direction to adapt the university life under the unfamiliar environment after admission.

Smartphone vs Wearable, Finding the Correction Factor for the Actual Step Count - Based on the In-situ User Behavior of the Two Devices - (스마트폰 vs 웨어러블, 실제 걸음 수 산출을 위한 보정계수의 발견 - 두 기기의 In-situ 활용 행태 비교를 바탕으로 -)

  • Han, Sang Kyu;Kim, Yoo Jung;An, A Ju;Heo, Eun Young;Kim, Jeong Whun;Lee, Joong Seek
    • Design Convergence Study
    • /
    • v.16 no.6
    • /
    • pp.123-135
    • /
    • 2017
  • In recent mobile health care service, health management using number of steps is becoming popular. In addition, a variety of activity trackers have made it possible to measure the number of steps more accurately and easily. Nevertheless, the activity tracker is not popularized, and it is a trend to use the pedometer sensor of the smartphone as an alternative. In this study, we tried to find out how much the number of steps collected by the smartphone versus the actual number of steps in actual situations, and what factors make the difference. We conducted an experiment to collect number of steps data of 21 people using the smartphone and wearable device simultaneously for 7 days. As a result, we found that the average number of steps of the smartphone is 62% compared to the actual number of steps, and that there is a large variation among users. We derived a regression model in which the accuracy of smartphone increases with the degree of awareness of smartphone. We expect that this can be used as a factor to correct the difference from the actual number of steps in the smartphone alone healthcare service.

Study on Changes of Street Furniture in Digital Environment (디지털 환경에서 가로시설물의 변화에 관한 연구)

  • In, Chiho;Kim, Hyunsoo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.1D
    • /
    • pp.129-136
    • /
    • 2008
  • Along with the development in cutting-edge digital technology, the street space is also being changed. Mobile telecommunication units and internet give a big change in a human being's lifestyle. And the ubiquitous computing is proceeding with expanding its application range from the indoor space to the street space. As the street furniture is the convenient facility that allows a human being's life in street space to be abundant, it is getting advanced. First of all, in terms of such phenomenon, this study analyzed the cases of a research on application of street space and the actual condition of a change in the number of individuals for the street furniture, through a literature research of ubiquitous. Also, it researched into the realities of using the street furniture of the walking-desired streets at Daehac-ro and Hongdae district, where are two representative places related to digital generation. The next was carried out FGI (Focus Group Interview) with users of the street space in front of Hongik University and managers of the street furniture, and was researched into the use & management behavior, and recognition level on the street furniture. Thus, the key elements were extracted such as interchange of information for cultural activities, automation for interaction variability in function. Finally the core elements for future vision of street furniture in this digital era were extracted in 3I, namely, Information, Intellectualization, and Integration. This is considered to be applied to the establishment of direction in the process of high-tech digitalization in street furniture related to information hereafter.

The Effect of Product Scarcity and Purchase Behavior in Location-Based Application Services (위치기반 어플리케이션 서비스에서 제품의 희소성과 구매행동과의 영향)

  • Wang Ming;Hyeokjun Kwon;Jaewon Choi
    • Information Systems Review
    • /
    • v.20 no.2
    • /
    • pp.209-226
    • /
    • 2018
  • Location-based services have distinctive service characteristics compared to the past online commerce used on the desktop. In any place, mobile communication devices can be used to access online and utilize online shopping, and it is more convenient for users. In addition, by providing shopping and service information specific to each location, it is possible to provide convenience to the consumers according to their locations. In addition, it provides scarcity of information as well as location, thereby increasing consumers' desire to purchase. In this study, we investigated the effect of scarcity on the Purchase intention of consumers in location-based services. The steps of scarcity are: first, a step without scarcity, Second, providing time limit information, Third, providing quantity limitation information, Fourth, the experiment was designed to provide time and quantity limitation, and 4 groups were analyzed through experimental stimuli The purpose of this study is to verify the moderating effect of the dependent variable on the degree of scarcity by adding 'ubiquity', 'interactivity' and 'privacy' which are characteristics of location-based service. As a result of the analysis, scarcity of time and scarcity of quantity limitation scarcity stimuli showed a moderating effect on ubiquity, interactivity and consumer's purchase intention, and these variables also directly or indirectly affected positively. Consumer confidence was found to have a negative effect on consumers' purchase intentions.

A Study of Performance Analysis on Effective Multiple Buffering and Packetizing Method of Multimedia Data for User-Demand Oriented RTSP Based Transmissions Between the PoC Box and a Terminal (PoC Box 단말의 RTSP 운용을 위한 사용자 요구 중심의 효율적인 다중 수신 버퍼링 기법 및 패킷화 방법에 대한 성능 분석에 관한 연구)

  • Bang, Ji-Woong;Kim, Dae-Won
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.54-75
    • /
    • 2011
  • PoC(Push-to-talk Over Cellular) is an integrated technology of group voice calls, video calls and internet based multimedia services. If a PoC user can not participate in the PoC session for various reasons such as an emergency situation, lack of battery capacity, then the user can use the PoC Box which has a similar functionality to the MM Box in the MMS(Multimedia Messaging Service). The RTSP(Real-Time Streaming Protocol) method is recommended to be used when there is a transmission session between the PoC box and a terminal. Since the existing VOD service uses a wired network, the packet size of RTSP-based VOD service is huge, however, the PoC service has wireless communication environments which have general characteristics to be used in RTSP method. Packet loss in a wired communication environments is relatively less than that in wireless communication environment, therefore, a buffering latency occurs in PoC service due to a play-out delay which means an asynchronous play of audio & video contents. Those problems make a user to be difficult to find the information they want when the media contents are played-out. In this paper, the following techniques and methods were proposed and their performance and superiority were verified through testing: cross-over dual reception buffering technique, advance partition multi-reception buffering technique, and on-demand multi-reception buffering technique, which are designed for effective picking up of information in media content being transmitted in short amount of time using RTSP when a user searches for media, as well as for reduction in playback delay; and same-priority packetization transmission method and priority-based packetization transmission method, which are media data packetization methods for transmission. From the simulation of functional evaluation, we could find that the proposed multiple receiving buffering and packetizing methods are superior, with respect to the media retrieval inclination, to the existing single receiving buffering method by 6-9 points from the viewpoint of effectiveness and excellence. Among them, especially, on-demand multiple receiving buffering technology with same-priority packetization transmission method is able to manage the media search inclination promptly to the requests of users by showing superiority of 3-24 points above compared to other combination methods. In addition, users could find the information they want much quickly since large amount of informations are received in a focused media retrieval period within a short time.

An Embedding /Extracting Method of Audio Watermark Information for High Quality Stereo Music (고품질 스테레오 음악을 위한 오디오 워터마크 정보 삽입/추출 기술)

  • Bae, Kyungyul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.21-35
    • /
    • 2018
  • Since the introduction of MP3 players, CD recordings have gradually been vanishing, and the music consuming environment of music users is shifting to mobile devices. The introduction of smart devices has increased the utilization of music through music playback, mass storage, and search functions that are integrated into smartphones and tablets. At the time of initial MP3 player supply, the bitrate of the compressed music contents generally was 128 Kbps. However, as increasing of the demand for high quality music, sound quality of 384 Kbps appeared. Recently, music content of FLAC (Free License Audio Codec) format using lossless compression method is becoming popular. The download service of many music sites in Korea has classified by unlimited download with technical protection and limited download without technical protection. Digital Rights Management (DRM) technology is used as a technical protection measure for unlimited download, but it can only be used with authenticated devices that have DRM installed. Even if music purchased by the user, it cannot be used by other devices. On the contrary, in the case of music that is limited in quantity but not technically protected, there is no way to enforce anyone who distributes it, and in the case of high quality music such as FLAC, the loss is greater. In this paper, the author proposes an audio watermarking technology for copyright protection of high quality stereo music. Two kinds of information, "Copyright" and "Copy_free", are generated by using the turbo code. The two watermarks are composed of 9 bytes (72 bits). If turbo code is applied for error correction, the amount of information to be inserted as 222 bits increases. The 222-bit watermark was expanded to 1024 bits to be robust against additional errors and finally used as a watermark to insert into stereo music. Turbo code is a way to recover raw data if the damaged amount is less than 15% even if part of the code is damaged due to attack of watermarked content. It can be extended to 1024 bits or it can find 222 bits from some damaged contents by increasing the probability, the watermark itself has made it more resistant to attack. The proposed algorithm uses quantization in DCT so that watermark can be detected efficiently and SNR can be improved when stereo music is converted into mono. As a result, on average SNR exceeded 40dB, resulting in sound quality improvements of over 10dB over traditional quantization methods. This is a very significant result because it means relatively 10 times improvement in sound quality. In addition, the sample length required for extracting the watermark can be extracted sufficiently if the length is shorter than 1 second, and the watermark can be completely extracted from music samples of less than one second in all of the MP3 compression having a bit rate of 128 Kbps. The conventional quantization method can extract the watermark with a length of only 1/10 compared to the case where the sampling of the 10-second length largely fails to extract the watermark. In this study, since the length of the watermark embedded into music is 72 bits, it provides sufficient capacity to embed necessary information for music. It is enough bits to identify the music distributed all over the world. 272 can identify $4*10^{21}$, so it can be used as an identifier and it can be used for copyright protection of high quality music service. The proposed algorithm can be used not only for high quality audio but also for development of watermarking algorithm in multimedia such as UHD (Ultra High Definition) TV and high-resolution image. In addition, with the development of digital devices, users are demanding high quality music in the music industry, and artificial intelligence assistant is coming along with high quality music and streaming service. The results of this study can be used to protect the rights of copyright holders in these industries.

Conceptual framework for Emotions in Usability of Products (제품 사용성과 감성에 관한 개념적 연구)

  • Lee Kun-Pyo;Jeong Sang-Hoon
    • Science of Emotion and Sensibility
    • /
    • v.8 no.1
    • /
    • pp.17-28
    • /
    • 2005
  • With the advent of computer technology, the fundamental nature of products has shaped from physical forms towards product interactivity, The focus is now on usability of the product with ease and efficiency rather than conversing with just the looks of the product. However, most definitions of usability and contemporary usability-related researches, have focused on the performance-oriented functional aspects of usability (i.e., how well users perform tasks using a product). Today, user expectations are higher; products that bring not only functional benefits but also emotional satisfaction. So far, there have been many studies on human emotions and the emotional side of products in the field of emotional engineering. Contemporary emotion-related researches have focused mainly on the relationship between product aesthetics and the emotional responses elicited by the products, but little is known about emotions elicited from using the products. The main objective of our research is analyzing user's emotional changes while using a product, to reveal the influence of usability on human emotions. In this research, we suggested conceptual framework for the study on the relationship between usability of products, and human emotions with emphasis on mobile phones. We also extracted emotional words for measuring user's emotions expressed not from looking at the product's appearance, but from using the product. First, we assembled a set of emotions that is sufficiently extensive to represent a general overview of the full repertoire of Korean emotions from the literature study. Secondly, we found emotional words in the after note by the users on the websites. Finally, verbal protocols in which the user says out loud what he/she ks feeling while he/she ks carrying out a task were collected. And then, the appropriateness of extracted emotional words was verified by the members of the consumer panel of a company through web survey. It is expected that emotional words extracted in this research will be used to measure user's emotional changes while using a product. Based on the conceptual framework suggested in this research, basic guidelines on interface design methods that reflect user's emotions will be illustrated.

  • PDF

Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model (건강신념모델을 이용한 소셜네트워크서비스에서의 개인정보보호행위에 관한 연구)

  • Shin, Se-mi;Kim, Seong-jun;Kwon, Do-soon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1619-1637
    • /
    • 2016
  • With wide distribution of smart phones and development of mobile network, social network service (SNS) is displaying remarkable growth rates. Users build new social relations by sharing their interests, which brings surging growth to the SNS based on the combination between the strength of expanding the place for communication and distribution of smart phones featured with easy portability. This study is designed to understand impact factors of SNS on users in Korea and to conduct empirical research on casual relationship between the factors above and the factors affecting personal information behavior through the privacy protection and self-efficacy. In order to accomplish the objective above, the study presented a research model applied with key variables of the Health Belief Model (HBM) predicting behaviors capable of recognizing and preventing individual diseases in the field of health communication. To perform empirical verification on the research model of this study, a survey was conducted upon college students at N university located in Chungcheongnam-do and K university in rural area, who have experiences using the SNS. Through this survey, a total of 186 samples were collected, and path analysis was performed in order to analyze the relationship between the factors. Based on the findings from the survey, first, variables Perceived probability, Perceived severity, Perceived impairment of the HBM, key factors of personal information protection behavior on the SNS, were found to exhibit negative relationship with self-efficacy, and Perceived probability, Perceived benefit, Perceived impairment were found to exhibit negative relationship with privacy protection. But the above, Perceived severity showed positive relationship with privacy protection, and Perceived benefit and self-efficacy also displayed positive relationship. Second, although self-efficacy, a parameter, showed positive relationship with privacy protection, it demonstrated negative relationship with personal information protection behavior. Lastly, privacy protection exhibited positive relationship with personal information protection behavior. By presenting theoretical model reflected with characteristics of prevention based on these findings above unlike previous studies on personal information protection using technologies threatening personal information, this study is to provide theoretical and operational foundation capable of offering explanations how to predict personal information protection behavior on the SNS in the future.

A study on security independent behavior in social game using expanded health belief model (건강신념모델을 확장한 소셜게임(Social Game) 보안의지행동에 관한 연구)

  • Ahn, Ho-Jeong;Kim, Sung-Jun;Kwon, Do-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.99-118
    • /
    • 2016
  • With the development of Internet and popularization of smartphones over recent years, social network services are experiencing rapid growth. On top of this, smartphone gaming market is showing a rapid growth and the use of mobile social games is on the significant rise. The occurrence of game data manipulation targeting these services and personal information leakage is highlighting the importance of social gaming security. This study is intended to propose development plans effective and efficient in social game services by figuring out factors putting effects on security dependent behavior of social game users in Korea and carrying out a practical study on the casual relationship between factors influencing security dependent behavior through recognized behavioral control and attitudes for privacy infringement of these factors. To do this, proposed was a study model in which the HBM(Health Belief Model) allowing the social game user to influence security dependent behavior was expanded and applied as a major variable. To verify the study model of this study practically, a survey was conducted among university students in Seoul-based K University and S University who had experienced using social game services. According to the study findings, firstly, the perceived seriousness turned out to provide positive influence to trust. But, the perceived seriousness turned out not to put positive effects on self-efficacy. Secondly, the perceived probability turned out not to put positive effects on self-efficacy and trust. Thirdly, the perceived gain turned out to put positive effects on self-efficacy and trust. Fourthly, the perceived disorder turned out not to put positive effects on self-efficacy and trust. Fifthly, self-efficacy turned out to put positive effects on trust. But, self-efficacy turned out not to put positive effects on security dependent behavior. Sixthly, trust turned out not to put positive effects on security dependent behavior. This study is intended to make a strategic proposal so that social game users can raise awareness of their level of security perception and security willingness through this.

  • PDF