• Title/Summary/Keyword: survey on the use

Search Result 7,179, Processing Time 0.037 seconds

JIT Production System of Domestic Manufacturers and It's Impact on Manufacturing Performance (국내 제조기업의 JIT생산방식의 도입과 제조성과에 관한 연구)

  • Kim Dae-Hong;Kim Sang-Bin
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.1
    • /
    • pp.64-71
    • /
    • 2005
  • The purpose of this study is to propose guidelines for introducing the Just-In-Time (JIT) production system to enhance the competitiveness of Korean manufacturing companies. This study employed an extensive survey on the use of the JIT production systems among different korean manufacturing companies to understand the current status of the JIT production system in use and to identify the benefits from implementing JIT production system. The survey has covered 170 manufacturing companies of different sizes from various sectors of Korean industries including electronics, automobiles, machineries, and textiles. In conclusion, our research results support that the JIT production system would contribute to increase the manufacturing performances of Korean manufacturing companies through lower inventory level and increased quality level.

The Effect of Social Influence on Flow, Perceived Usefulness and Intention to Use in Online Community (온라인 커뮤니티에서 사회적 영향이 플로우, 지각된 유용성, 이용의도에 미치는 영향: 싸이월드를 중심으로)

  • Ryu, Il;Choi, Hyuk-Ra
    • The Journal of Information Systems
    • /
    • v.17 no.2
    • /
    • pp.113-135
    • /
    • 2008
  • This study introduces the construct of social influence and combines the construct with the flow theory and TAM framework Subjective norm, image, and visibility identified as the dimensions of social influence are hypothesized to influence flow and perceived usefulness, and then the intention to use of online community. Data were collected through a survey of respondents who have the experience of using an online community, and analyzed by using structure equations modelling. The major findings of this study are as follows: First, subjective norm was found to have a positive influence on flow and intention to use. Second, image was found to have a positive effect chi flow and perceived usefulness. Third, visibility was found to have a positive influence on perceived usefulness. Finally, flow and perceived usefulness were also found to have a positive effect on the intention to use. Implications of these findings are discussed for researchers and practitioners.

A Study on Gender Differences in the Perception and Use of Internet (인터넷 사용과 지각의 성별차이에 관한 연구)

  • Lee, Dong-Man;Lee, Young-Sook;Ahn, Hyun-Sook
    • Asia pacific journal of information systems
    • /
    • v.12 no.1
    • /
    • pp.103-122
    • /
    • 2002
  • The technology acceptance model(TAM) has been widely studied in IS research and Internet has been expanded very rapidly in modern society. The purpose of this study is to provide an internet acceptance model and test it empirically. This study extends the TAM model and motivation theory by adding gender. This model posits that perceived ease of use, perceived usefulness and perceived playfulness correlate with Internet use, Test results are as follows: First, the survey suggested the three factors-perceived usefulness, perceived ease of use and perceived playfulness-affect the use of Internet. Second, Difference just appeared in case of perceived use of use between genders but not others-perceived usefulness and perceived playfulness. Third, the result represented that there was nothing that affected the use of Internet by itself among the three factors-perceived usefulness, ease of use and playfulness and perceived usefulness used gender as a moderated variable in the case of the use of Internet.

Research on Use Motivations of Mobile Payment Adopters: A Case Study on Chinese Oversea Students in South Korea

  • Liu, Zi-Yang;Li, Hao;Chen, Yi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.8
    • /
    • pp.59-66
    • /
    • 2018
  • In this paper we purposes to analyze the motivation of mobile payment adopters. In this study, with unified theory of acceptance and use of technology (UTAUT) model as the basis of research, we set up a structural equation model based on gender, age, experience and voluntary, collected data in the form of a questionnaire survey and analyzed drivers that affected mobile payers. In this study, The necessity of this paper is that the group of Korean students belongs to a special group with nearly 70,000 people. The penetration rate of mobile payment in China is 77%, ranking first in the world, but after the young people came to Korea. There are many obstacles and inconveniences when using mobile payment. We have proposed special subjects for special populations. the survey data were analyzed using SPSS22.0 and AMOS22.0 statistical software and the proposed model was modified. The results show that consumers' mobile payment is mainly motivated by social influence and performance expectancy. These results are of theoretical value and offer a new direction and implications to mobile payment developers. Besides, they also provide useful information and guidance for enterprises to aim at the market of Chinese oversea students in South Korea.

Effects of denture use on the quality of life of cancer patients over 40 years of age: The 6th-7th Korea National Health and Nutrition Examination Survey (2013-2018) (40세 이상 암 환자의 의치 사용이 삶의 질에 미치는 영향 :국민건강영양조사 제6-7기(2013-2018년) 자료 이용)

  • A-Jung Lee;Mi-Ra Lee;Min-Kyung Kang
    • Journal of Korean society of Dental Hygiene
    • /
    • v.24 no.2
    • /
    • pp.141-148
    • /
    • 2024
  • Objectives: The purpose of this study was to investigate the effect of denture use on the quality of life of cancer patients aged ≥40 years. Methods: Data from the National Health and Nutrition Examination Survey (2013-2018) were used in this study. A total of 302 individuals were selected as the final study participants. Data were analyzed using the chi-square test and logistic regression analysis using SPSS software. Results: The quality of life in the group with dentures was lower than that in the group without dentures. Conclusions: The use of dentures had a significant effect on the quality of life of cancer patients aged ≥40 years. Therefore, national dental care guidelines and policies should be developed to prevent an increase in tooth loss in patients with cancer.

An Investigation on Consumer's Internet Shopping Behavior Explained By the Technology Acceptance Model (혁신기술수용모델(TAM)을 응용한 인터넷쇼핑행동 고찰)

  • Koo, Dong-Mo
    • Asia pacific journal of information systems
    • /
    • v.13 no.1
    • /
    • pp.141-170
    • /
    • 2003
  • This study investigates internet shopping behavior of consumers. The rapid growth of the internet shopping markets is solely dependent on the voluntary adoption of internet shopping medium by the personal users. But the studies on this topic are very limited. Based on these facts, this study, recognizing the internet shopping medium as an innovation, studies how consumers understand and use innovative internet shopping medium by applying and extending the technology acceptance model proposed by Davis et. al.(1989). The results of the survey on 947 consumer panel reveal that compatibility, system quality have positive impact on the formation of perceived ease of use. And it is also shown that the perceived ease of use, system quality, and compatibility have positive influence on perceived usefulness, but computer-efficacy has no effect on perceived usefulness. Meanwhile, it is confirmed that perceived usefulness and compatibility have positive effect on attitude toward internet shopping behavior, but perceived ease of use has no effect. In addition, perceived security and social norm, as opposed to the hypotheses, are shown to have no effect on internet shopping behavior. Lastly, applications and related limitations are discussed.

Survey on the use of security metrics on attack graph

  • Lee, Gyung-Min;Kim, Huy-Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.95-105
    • /
    • 2018
  • As the IT industry developed, the information held by the company soon became a corporate asset. As this information has value as an asset, the number and scale of various cyber attacks which targeting enterprises and institutions is increasing day by day. Therefore, research are being carried out to protect the assets from cyber attacks by using the attack graph to identify the possibility and risk of various attacks in advance and prepare countermeasures against the attacks. In the attack graph, security metric is used as a measure for determining the importance of each asset or the risk of an attack. This is a key element of the attack graph used as a criterion for determining which assets should be protected first or which attack path should be removed first. In this survey, we research trends of various security metrics used in attack graphs and classify the research according to application viewpoints, use of CVSS(Common Vulnerability Scoring System), and detail metrics. Furthermore, we discussed how to graft the latest security technologies, such as MTD(Moving Target Defense) or SDN(Software Defined Network), onto the attack graphs.

A Study On The Recognition of Elementary School Teachers′ Problem-solving Strategy (초등학교 현장 교사의 문제해결 전략의 인지도)

  • 최순만
    • Journal of the Korean School Mathematics Society
    • /
    • v.6 no.1
    • /
    • pp.19-26
    • /
    • 2003
  • The purpose of this study is twofold: (i) to argue the importance of problem solving strategy in education and (m to propose an efficient way to use the problem-solving strategy, which is based on the survey to find out how well elementary school teachers recognize the importance of the strategy. Forty elementary school teachers participated in the survey. The result of the survey shows that they do not use various strategies when they solve problems. It also shows that the rate of wrong answers the teachers get when solving problems is pretty high because they adopt a wrong strategy. It is prerequisite that teachers recognize the importance of the strategy when solving problems and put into practice various strategies in order to help their students improve their problem-solving abilities.

  • PDF

Implementation of Quantitative Unrelated Question Model for Obtaining Sensitive Information at On-Line Survey

  • Park, Hee-Chang;Ryu, Jee-Hyun;Lee, Sung-Yong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.14 no.3
    • /
    • pp.591-603
    • /
    • 2003
  • This paper is planned to use randomized response technique which is an indirect response technique on internet as a way of obtaining much more precise information, not revealing secrets of responsors, considering that respondents are generally reluctant to answer in a survey to get sensitive information targeting employees, customers, etc.

  • PDF

Binomial Distribution Based Reputation for WSNs: A Comprehensive Survey

  • Wei, Zhe;Yu, Shuyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3793-3814
    • /
    • 2021
  • Most secure solutions like cryptography are software based and they are designed to mainly deal with the outside attacks for traditional networks, but such soft security is hard to be implemented in wireless sensor networks to counter the inside attacks from internal malicious nodes. To address this issue, reputation has been introduced to tackle the inside malicious nodes. Reputation is essentially a stimulating mechanism for nodes' cooperation and is employed to detect node misbehaviors and improve the trust-worthiness between individual nodes. Among the reputation models, binomial distribution based reputation has many advantages such as light weight and ease of implementation in resource-constraint sensor nodes, and accordingly researchers have proposed many insightful related methods. However, some of them either directly use the modelling results, apply the models through simple modifications, or only use the required components while ignoring the others as an integral part of the whole model, this topic still lacks a comprehensive and systematical review. Thus the motivation of this study is to provide a thorough survey concerning each detailed functional components of binomial distribution based reputation for wireless sensor networks. In addition, based on the survey results, we also argue some open research problems and suggest the directions that are worth future efforts. We believe that this study is helpful to better understanding the reputation modeling mechanism and its components for wireless sensor networks, and can further attract more related future studies.