• Title/Summary/Keyword: modeling process

Search Result 5,295, Processing Time 0.037 seconds

A Study on the Black Box Design using Collective Intelligence Analysis (집단지성 분석법을 활용한 블랙박스 디자인 개발 연구)

  • Lee, Hee young;Hong, Jeong Pyo;Cho, Kwang Soo
    • Science of Emotion and Sensibility
    • /
    • v.21 no.2
    • /
    • pp.101-112
    • /
    • 2018
  • This study was carried out to enhance the competitiveness of blackbox design for domestic and international companies, based on the explosive growth of the blackbox market due to development of blackbox design for vehicle accident prevention and post-treatment. In the past, the blackbox market has produced products indiscriminately to meet the ever-increasing demand of consumers. Therefore, we thought a new design method was necessary to effectively investigate the needs of rapidly changing consumers. In this study, we aimed to identify the best-selling blackbox to understand the design flow, and the optimum area for a blackbox, considering the uniqueness of associated vehicle. Based on discussion with blackbox design experts, we studied the direction of design and the problems with blackbox use, which were reflected in blackbox development. Through this research, two types of design - leading blackbox (A type) and mass production blackbox (B type) - were proposed for compatibility of the blackbox with the car. The leading type of blackbox was positioned so that it was wrapped with the room mirror hinge before the screw was fastened, in order to achieve an integrated design. Therefore, we designed an integrated form and resolved the placement problem of an adhesive blackbox. To blend, the mass production blackbox implemented material and surface processing in the same way with the car, and adopted the slide structure to automatically turn off the main body power when removing the SDcard, reflecting consumer needs. This study considers evolving consumer needs through a case study and collective intelligence and deals with implementation of the whole design process during mass production. In this study, we aimed to strengthen the competitiveness of the blackbox design based on design method and its realization.

A Study of Organic Matter Fraction Method of the Wastewater by using Respirometry and Measurements of VFAs on the Filtered Wastewater and the Non-Filtered Wastewater (여과한 하수와 하수원액의 VFAs 측정과 미생물 호흡률 측정법을 이용한 하수의 유기물 분액 방법에 관한 연구)

  • Kang, Seong-wook;Cho, Wook-sang
    • Journal of the Korea Organic Resources Recycling Association
    • /
    • v.17 no.1
    • /
    • pp.58-72
    • /
    • 2009
  • In this study, the organic matter and biomass was characterized by using respirometry based on ASM No.2d (Activated Sludge Model No.2d). The activated sludge models are based on the ASM No.2d model, published by the IAWQ(International Association on Water Quality) task group on mathematical modeling for design and operation of biological wastewater treatment processes. For this study, OUR(Oxygen Uptake Rate) measurements were made on filtered as well as non-filtered wastewater. Also, GC-FID and LC analysis were applied for the estimation of VFAs(Volatile Fatty Acids) COD(S_A) in slowly bio-degradable soluble substrates of the ASM No.2d. Therefore, this study was intended to clearly identify slowly bio-degradable dissolved materials(S_S) and particulate materials(X_I). In addition, a method capable of determining the accurate time to measure non-biodegradable COD(S_I), by the change of transition graphs in the process of measuring microbial OUR, was presented in this study. Influent fractionation is a critical step in the model calibrations. From the results of respirometry on filtered wastewater, the fraction of fermentable and readily biodegradable organic matter(S_F), fermentation products(S_A), inert soluble matter(S_I), slowly biodegradable matter(X_S) and inert particular matter(X_I) was 33.2%, 14.1%, 6.9%, 34.7%, 5.8%, respectively. The active heterotrophic biomass fraction(X_H) was about 5.3%.

  • PDF

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

The Effect of Meta-Features of Multiclass Datasets on the Performance of Classification Algorithms (다중 클래스 데이터셋의 메타특징이 판별 알고리즘의 성능에 미치는 영향 연구)

  • Kim, Jeonghun;Kim, Min Yong;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.1
    • /
    • pp.23-45
    • /
    • 2020
  • Big data is creating in a wide variety of fields such as medical care, manufacturing, logistics, sales site, SNS, and the dataset characteristics are also diverse. In order to secure the competitiveness of companies, it is necessary to improve decision-making capacity using a classification algorithm. However, most of them do not have sufficient knowledge on what kind of classification algorithm is appropriate for a specific problem area. In other words, determining which classification algorithm is appropriate depending on the characteristics of the dataset was has been a task that required expertise and effort. This is because the relationship between the characteristics of datasets (called meta-features) and the performance of classification algorithms has not been fully understood. Moreover, there has been little research on meta-features reflecting the characteristics of multi-class. Therefore, the purpose of this study is to empirically analyze whether meta-features of multi-class datasets have a significant effect on the performance of classification algorithms. In this study, meta-features of multi-class datasets were identified into two factors, (the data structure and the data complexity,) and seven representative meta-features were selected. Among those, we included the Herfindahl-Hirschman Index (HHI), originally a market concentration measurement index, in the meta-features to replace IR(Imbalanced Ratio). Also, we developed a new index called Reverse ReLU Silhouette Score into the meta-feature set. Among the UCI Machine Learning Repository data, six representative datasets (Balance Scale, PageBlocks, Car Evaluation, User Knowledge-Modeling, Wine Quality(red), Contraceptive Method Choice) were selected. The class of each dataset was classified by using the classification algorithms (KNN, Logistic Regression, Nave Bayes, Random Forest, and SVM) selected in the study. For each dataset, we applied 10-fold cross validation method. 10% to 100% oversampling method is applied for each fold and meta-features of the dataset is measured. The meta-features selected are HHI, Number of Classes, Number of Features, Entropy, Reverse ReLU Silhouette Score, Nonlinearity of Linear Classifier, Hub Score. F1-score was selected as the dependent variable. As a result, the results of this study showed that the six meta-features including Reverse ReLU Silhouette Score and HHI proposed in this study have a significant effect on the classification performance. (1) The meta-features HHI proposed in this study was significant in the classification performance. (2) The number of variables has a significant effect on the classification performance, unlike the number of classes, but it has a positive effect. (3) The number of classes has a negative effect on the performance of classification. (4) Entropy has a significant effect on the performance of classification. (5) The Reverse ReLU Silhouette Score also significantly affects the classification performance at a significant level of 0.01. (6) The nonlinearity of linear classifiers has a significant negative effect on classification performance. In addition, the results of the analysis by the classification algorithms were also consistent. In the regression analysis by classification algorithm, Naïve Bayes algorithm does not have a significant effect on the number of variables unlike other classification algorithms. This study has two theoretical contributions: (1) two new meta-features (HHI, Reverse ReLU Silhouette score) was proved to be significant. (2) The effects of data characteristics on the performance of classification were investigated using meta-features. The practical contribution points (1) can be utilized in the development of classification algorithm recommendation system according to the characteristics of datasets. (2) Many data scientists are often testing by adjusting the parameters of the algorithm to find the optimal algorithm for the situation because the characteristics of the data are different. In this process, excessive waste of resources occurs due to hardware, cost, time, and manpower. This study is expected to be useful for machine learning, data mining researchers, practitioners, and machine learning-based system developers. The composition of this study consists of introduction, related research, research model, experiment, conclusion and discussion.

The Relationship with Electronic Trust, Web Site Commitment and Service Transaction Intention in Public Shipping B2B e-marketplace (해운 B2B e-marketplace의 전자적 신뢰, 사이트몰입 및 서비스 거래의도와의 관계성)

  • Kim, Yong-Man;Kim, Seog-Yong;Lee, Jong-Hwan;Shim, Gyu-Yeol
    • Journal of Global Scholars of Marketing Science
    • /
    • v.17 no.4
    • /
    • pp.113-139
    • /
    • 2007
  • This study aims to, looking from a standpoint of network, has investigated the shipping industry's B2B e-marketplace, the characteristics that can earn electronic trust from the users, and characteristics of the web-site. It has examined the mechanism whereby electronic trust be earned and how it affects web-site involvement and service transaction intention. Ultimately, The study attempts to make proposals whereby such trust can lead for a cooperative trading community in the shipping industry's B2B e-marketplace The Covalence structural equation modeling was designed and empirically tested for the shipping industry's B2B e-marketplace. The shipping industry employees were given questionnaires and data were analyzed. Except for perceived security of the three characteristic factors on the web-site, the perceived site quality and characteristics factors in operation only affected co-variables. Transaction Fairness was determined to be the most important factor among exogenous factors increasing electronic trust. With regards to transaction rules, if a transaction is beneficial only to one side, then no long term transaction will not take place. If the concerned parties properly recognize that transaction fairness is crucial to electronic transaction, then it will enormously contribute to successful operations of shipping e-marketplace. Also, Perceived efficiency in transaction also affects electronic trust. This reduces transaction costs and speeds up and simplifies the transaction process. It has reduced greater time and costs than existing off-line transaction, and would positively affect electronic trust. By making an open forum for participants to obtain information for transaction, they can gather useful information, and at the same time, the web-site operator can provide information, which, in turn, will increase electronic trust in electronic transaction. Furthermore, such formation of trust in electronic transaction influences shipping companies in such a way that they will want to continuously participate in the transaction, raising web-site involvement. The result of increased trust is that shipping companies in the future will do business with each other and form a foundation for continuous transactions amongst themselves. Consequently, the formation of trust in electronic transaction greatly influences web-site involvement and service transaction intention. The results of the study have again proved that in order to maintain continuous business relationship with the current clients, electronic trust in virtual space, which operates the shipping industry's B2B e-marketplace, is important for the interested parties.

  • PDF

An Estimation of Price Elasticities of Import Demand and Export Supply Functions Derived from an Integrated Production Model (생산모형(生産模型)을 이용(利用)한 수출(輸出)·수입함수(輸入函數)의 가격탄성치(價格彈性値) 추정(推定))

  • Lee, Hong-gue
    • KDI Journal of Economic Policy
    • /
    • v.12 no.4
    • /
    • pp.47-69
    • /
    • 1990
  • Using an aggregator model, we look into the possibilities for substitution between Korea's exports, imports, domestic sales and domestic inputs (particularly labor), and substitution between disaggregated export and import components. Our approach heavily draws on an economy-wide GNP function that is similar to Samuelson's, modeling trade functions as derived from an integrated production system. Under the condition of homotheticity and weak separability, the GNP function would facilitate consistent aggregation that retains certain properties of the production structure. It would also be useful for a two-stage optimization process that enables us to obtain not only the net output price elasticities of the first-level aggregator functions, but also those of the second-level individual components of exports and imports. For the implementation of the model, we apply the Symmetric Generalized McFadden (SGM) function developed by Diewert and Wales to both stages of estimation. The first stage of the estimation procedure is to estimate the unit quantity equations of the second-level exports and imports that comprise four components each. The parameter estimates obtained in the first stage are utilized in the derivation of instrumental variables for the aggregate export and import prices being employed in the upper model. In the second stage, the net output supply equations derived from the GNP function are used in the estimation of the price elasticities of the first-level variables: exports, imports, domestic sales and labor. With these estimates in hand, we can come up with various elasticities of both the net output supply functions and the individual components of exports and imports. At the aggregate level (first-level), exports appear to be substitutable with domestic sales, while labor is complementary with imports. An increase in the price of exports would reduce the amount of the domestic sales supply, and a decrease in the wage rate would boost the demand for imports. On the other hand, labor and imports are complementary with exports and domestic sales in the input-output structure. At the disaggregate level (second-level), the price elasticities of the export and import components obtained indicate that both substitution and complement possibilities exist between them. Although these elasticities are interesting in their own right, they would be more usefully applied as inputs to the computational general equilibrium model.

  • PDF

Stress dissipation characteristics of four implant thread designs evaluated by 3D finite element modeling (4종 임플란트 나사산 디자인의 응력분산 특성에 대한 3차원 유한요소해석 연구)

  • Nam, Ok-Hyun;Yu, Won-Jae;Kyung, Hee-Moon
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.53 no.2
    • /
    • pp.120-127
    • /
    • 2015
  • Purpose: The aim was to investigate the effect of implant thread designs on the stress dissipation of the implant. Materials and methods: The threads evaluated in this study included the V-shaped, buttress, reverse buttress, and square-shaped threads, which were of the same size (depth). Building four different implant/bone complexes each consisting of an implant with one of the 4 different threads on its cylindrical body ($4.1mm{\times}10mm$), a force of 100 N was applied onto the top of implant abutment at $30^{\circ}$ with the implant axis. In order to simulate different osseointegration stages at the implant/bone interfaces, a nonlinear contact condition was used to simulate immature osseointegration and a bonding condition for mature osseointegration states. Results: Stress distribution pattern around the implant differed depending on the osseointegration states. Stress levels as well as the differences in the stress between the analysis models (with different threads) were higher in the case of the immature osseointegration state. Both the stress levels and the differences between analysis models became lower at the completely osseointegrated state. Stress dissipation characteristics of the V-shape thread was in the middle of the four threads in both the immature and mature states of osseointegration. These results indicated that implant thread design may have biomechanical impact on the implant bed bone until the osseointegration process has been finished. Conclusion: The stress dissipation characteristics of V-shape thread was in the middle of the four threads in both the immature and mature states of osseointegration.

The Effects of Cognitive Bias on Entrepreneurial Opportunity Evaluations through Perceived Risks in Entrepreneurial Self-Efficacy (창업가의 인지편향이 지각된 위험과 조절된 창업효능감에 따라 창업기회평가에 미치는 영향)

  • Kim, Daeyop;Park, Jaehwan
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.15 no.1
    • /
    • pp.95-112
    • /
    • 2020
  • This paper is to investigate how cognitive bias of college students and entrepreneurs relates to perceived risks and entrepreneurial opportunities that represent uncertainty, and how various cognitive bias and entrepreneurial efficacy In the same way. The purpose of this study is to find improvement points of entrepreneurship education for college students and to suggest problems and improvement possibilities in the decision making process of current entrepreneurs. This empirical study is a necessary to improve the decision-making of individuals who want to start a business at the time when various attempts are made to activate the start-up business and increase the sustainability of the existing SME management. And understanding of the difference in opportunity evaluation, and suggests that it is necessary to provide good opportunities together with the upbringing of entrepreneurs. In order to achieve the purpose of the study, questionnaires were conducted for college students and entrepreneurs. A total of 363 questionnaire data were obtained and demonstrated through structural equation modeling. This study confirms that there is some relationship between perceived risk and cognitive bias. Overconfidence and control illusions among cognitive bias have a significant relationship between perceived risk and wealth. Especially, it is confirmed that control illusion of college students has a significant relationship with perceived risk. Second, cognitive bias demonstrated some significant relationship with opportunity evaluation. Although we did not find evidence that excess self-confidence is related to opportunity evaluation, we have verified that control illusions and current status bias are related to opportunity evaluation. Control illusions were significant in both college students and entrepreneurs. Third, perceived risk has a negative relationship with opportunity evaluation. All students, regardless of whether they are college students or entrepreneurs, judge opportunities positively if they perceive low risk. Fourth, it can be seen from the college students 'group that entrepreneurial efficacy has a moderating effect between perceived risk and opportunity evaluation, but no significant results were found in the entrepreneurs' group. Fifth, the college students and entrepreneurs have different cognitive bias, and they have proved that there is a different relationship between entrepreneurial opportunity evaluation and perceived risk. On the whole, there are various cognitive biases that are caused by time pressure or stress on college students and entrepreneurs who have to make judgments in uncertain opportunities, and in this respect, they can improve their judgment in the future. At the same time, university students can have a positive view of new opportunities based on high entrepreneurial efficacy, but if they fully understand the intrinsic risks of entrepreneurship through entrepreneurial education and fully understand the cognitive bias present in direct entrepreneurial experience, You will get a better opportunity assessment. This study has limitations in that it is based on the fact that university students and entrepreneurs are integrated, and that the survey respondents are selected by the limited random sampling method. It is necessary to conduct more systematic research based on more faithful data in the absence of the accumulation of entrepreneurial research data. Second, the translation tools used in the previous studies were translated and the meaning of the measurement tools might not be conveyed due to language differences. Therefore, it is necessary to construct a more precise scale for the accuracy of the study. Finally, complementary research should be done to identify what competitive opportunities are and what opportunities are appropriate for entrepreneurs.

Estimation of fire Experiment Prediction by Utility Tunnels Fire Experiment and Simulation (지하공동구 화재 실험 및 시뮬레이션에 의한 화재 설칠 예측 평가)

  • 윤명오;고재선;박형주;박성은
    • Fire Science and Engineering
    • /
    • v.15 no.1
    • /
    • pp.23-33
    • /
    • 2001
  • The utility tunnels are the important facility as a mainstay of country because of the latest communication developments. However, the utilities tunnel is difficult to deal with in case of a fire accident. When a cable burns, the black smoke containing poisonous gas will be reduced. This black smoke goes into the tunnel, and makes it difficult to extinguish the fire. Therefore, when there was a fire in the utility tunnel, the central nerves of the country had been paralyzed, such as property damage, communication interruption, in addition to inconvenience for people. This paper is based on the fire occurred in the past, and reenacting the fire by making the real utilities tunnel model. The aim of this paper is the scientific analysis of the character image of the fire, and the verification of each fire protection system whether it works well after process of setting up a fire protection system in the utilities tunnel at a constant temperature. The fire experiment was equipped with the linear heat detector, the fire door, the connection water spray system and the ventilation system in the utilities tunnel. Fixed portion of an electric power supply cable was coated with a fire retardant coating, and a heating tube was covered with a fireproof. The result showed that the highest temperature was $932^{\circ}c$ and the linear heat detector was working at the constant temperature, and it pointed at the place of the fire on the receiving board, and Fixed portion of the electric power supply cable coated with the fire retardant coating did not work as the fireproof. The heating tube was covered with the fireproof about 30 minutes.

  • PDF

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF