• Title/Summary/Keyword: user' behavior

Search Result 1,755, Processing Time 0.028 seconds

Study on measures to introduce Drone Delivery Service for domestic logistics (국내 물류기업의 드론배송서비스 도입방안에 관한 연구)

  • Yoo, Hyun Tae;You, Hak Soo;Jeong, Yoon Say
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.243-249
    • /
    • 2018
  • This study is to verify the accommodation attitudes and intention of use of the end-users to use the drone distribution delivery service that is to be introduced in Korea. For a research purpose, the research model and hypothesis in this study have been set based on by using the SPSS 22.0. Upon these, the extended technology acceptance model has been used to verify the correlation service of new technology, and the result has shown that the user of drone distribution delivery service has a causal relationship with individual innovation and that the accommodation behavior and intention of use have a causal relationship with economic efficiency and convenience. However, there was no causal relation from a perceived risk. Hence, based on the results of study about accommodation behaviors and intention of use of the end users of drone distribution delivery service, the marketing implications have been provided for commercialization of drone delivery service.

A Virtualization Management Convergence Access Control Model for Cloud Computing Environments (클라우드 컴퓨팅 환경에서 가상화 관리 융합접근제어 모델)

  • Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.69-75
    • /
    • 2018
  • The purpose of access control is to prevent computing resources from illegal behavior such as leakage, modification, and destruction by unauthorized users. As the cloud computing environment is expanded to resource sharing services using virtualization technology, a new security model and access control technique are required to provide dynamic and secure cloud-based computing services. The virtualization management convergence access control model provides a flexible user authorization function by applying the dynamic privilege assignment function to the role based access control mechanism. In addition, by applying access control mechanism based on security level and rules, we solve the conflict problem in virtual machine system and guarantee the safeness of physical resources. This model will help to build a secure and efficient cloud-based virtualization management system and will be expanded to a mechanism that reflects the multi-level characteristics.

A Study on the Impacts of Multitasking Behaviors on Smartphone Addiction (스마트폰 사용자의 멀티태스킹 행동이 스마트폰 중독에 미치는 영향에 관한 연구)

  • Byun, Hye Sun;Han, Dong Gyun;Lee, Sunro
    • Informatization Policy
    • /
    • v.21 no.4
    • /
    • pp.59-80
    • /
    • 2014
  • As usage of smartphone increases, it causes various social issues including smartphone addiction. This study, therefore, examined the impact of smartphone users' multitasking behaviors, satisfaction and flows on the smartphone addiction. Also, this research investigated the impacts of users' characteristics such as their polychronicity, innovativeness, and self-efficacy on their multitasking behaviors. The results of this study can be summarized as follows: users' polychronicity showed positive impact on their multitasking behaviors while innovativeness and self-efficacy did not. In addition, users' multitasking behaviors had significantly positive effects on satisfaction, flow and addiction. Users' satisfaction, however, did not show the direct impact on addiction while the positive impact on the flow, which in turn had direct effects on addiction. In sum, users' polychronicity and their multitasking behavior can be considered one of the most important predictors directly and indirectly through flow explaining smartphone addiction.

Sitting Posture-Based Lighting System to Enhance the Desired Mood

  • Bae, Hyunjoo;Kim, Haechan;Suk, Hyeon-Jeong
    • Journal of the Ergonomics Society of Korea
    • /
    • v.34 no.2
    • /
    • pp.191-198
    • /
    • 2015
  • Objective: As a cue for desired mood, we attempted to identify types of sitting postures when people are involved in various tasks during their working hours. Background: Physical behaviors in reaction to user contexts were studied, such as automated posture analysis for detecting a subject's emotion. Sitting postures have high feasibility and can be detected robustly with a sensing chair, especially when it comes to an office. Method: First, we attached seven sensors, including six pressure sensors and one distance sensor, to an office chair. In Part 1, we recorded participants' postures while they took part in four different tasks. From the seven sensors, we gathered five sets of data related to the head, the lumbar, the hip, thigh pressure and the distance between the backrest and the body. We classified them into four postures: leaning forward, upright, upright with the lumbar supporting, and leaning backward. In part 2, we requested the subjects to take suitable poses for the each of the four task types. In this way, we compared the matches between postures and tasks in a natural setting to those in a controlled situation. Results: We derived four types of sitting postures that were mapped onto the different tasks. The comparison yielded no statistical significance between Parts 1 and 2. In addition, there was a significant association between the task types and the posture types. Conclusion: The users' sitting postures were related to different types of tasks. This study demonstrates how human emotion can interact with lighting, as mediated through physical behavior. Application: We developed a posture-based lighting system that manipulates the quality of office lighting and is operated by changes in one's posture. Facilitated by this system, color temperatures ranging between 3,000K and 7,000K and illuminations ranging between 300lx and 700lx were modulated.

The Effects of the Social Risk on the Resistance of Purchase in Mobile Shopping (모바일 쇼핑의 사회적 위험이 구매저항에 미치는 영향)

  • Moon, Hye-Mi;Lee, Kyeong-Rak;Lee, Sang-Joon
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.93-106
    • /
    • 2014
  • All of smart phone users not always make a good use of mobile shopping. The main cause is that in case of non-user of mobile shopping, potential apprehension to psychological and security weakness affects building up resistance on mobile shopping. In this paper, we designed models of innovation resistance heavily based on literature reviews and previous studies, and tried to find how perceived risk affects consumer's purchase intention in mobile shopping process. In conclusion, it shows that security, one of psychological factors, affects perceived risk in all aspects, while negative influence of society and cognitive dissonance just affect social risk and delivery risk, and uncertainty also just affects performance risk. Besides, it shows that all of variables made up perceived risk affects resistance of purchase. Especially social risk turns out to be a most influential factor to purchase behavior through smart phone.

An Expansion of Affective Image Access Points Based on Users' Response on Image (이용자 반응 기반 이미지 감정 접근점 확장에 관한 연구)

  • Chung, Eun Kyung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.3
    • /
    • pp.101-118
    • /
    • 2014
  • Given the context of rapid developing ubiquitous computing environment, it is imperative for users to search and use images based on affective meanings. However, it has been difficult to index affective meanings of image since emotions of image are substantially subjective and highly abstract. In addition, utilizing low level features of image for indexing affective meanings of image has been limited for high level concepts of image. To facilitate the access points of affective meanings of image, this study aims to utilize user-provided responses of images. For a data set, emotional words are collected and cleaned from twenty participants with a set of fifteen images, three images for each of basic emotions, love, sad, fear, anger, and happy. A total of 399 unique emotion words are revealed and 1,093 times appeared in this data set. Through co-word analysis and network analysis of emotional words from users' responses, this study demonstrates expanded word sets for five basic emotions. The expanded word sets are characterized with adjective expression and action/behavior expression.

Pattern of Pharmacist Consultation among the Health Counseling Services via Internet Portal Sites: A Pilot Study (국내 포털사이트에서의 지식검색서비스를 이용한 약사와의 상담 패턴에 대한 시험적 연구)

  • Kim, Heejin;Park, Jun Ha;Ji, Eunhee
    • Korean Journal of Clinical Pharmacy
    • /
    • v.26 no.4
    • /
    • pp.324-329
    • /
    • 2016
  • Background: With the development of information and communication technology, there is a growing number of people looking for health information on the internet. This pilot study was performed to analyze the pattern of pharmacist consultation on the internet portal site. Methods: Questions and answers posted on the portal site "Naver Jisik-iN" from March 1st to 31th in 2016 were collected. Medications asked were categorized into prescription drugs, nonprescription drugs, sanitary aids, emergency drugs, functional health foods, and others. Medications were subcategorized into 14 according to the anatomical therapeutic chemical classification system. Questions were divided into 10 categories based on Hepler's drug-related problems. Results: Of the 955 cases, females accounted for 59.5% and inquirers from 11 to 40 years old, 89.4%. The number of prescription drugs, nonprescription drugs, sanitary aids, emergency drugs, functional health foods, and others were 428 (44.8%), 328 (34.3%), 31 (3.3%), 2 (0.2%), 122 (12.8%), and 44 (4.6%), respectively. Questions for drugs acting on alimentary tract and metabolism took up 27.4% followed by those on nervous system, 13.6% and anti-infectives for systemic use, 12.2%. Pharmacist consultation regarding drug information, drug interaction, and adverse reaction occupied 47.9%, 15.2%, and 12.3%, respectively. Conclusion: Health counseling through online is predicted to increase steadily, so pharmacists should broaden their boundaries beyond off-line pharmacies to meet social needs.

A Study on Urban Railway Service Quality by Technology Acceptance Model (기술수용모형을 통한 도시철도 서비스품질에 관한 연구)

  • Yu, Hyun;Kim, Myungsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.1
    • /
    • pp.14-25
    • /
    • 2017
  • This study aims to verify the causal relationship between service quality of the urban railway operating agency and users' behaviors, targeting the urban railway users. The perceived ease of use of the urban railway service quality had an influence on tangibility and convenience, and the perceived usefulness was significant to all attributes; therefore, it is judged that reliability, correspondence and safety should be improved to increase the users' perceived ease of use of the urban railway service quality. Based on these study results, the urban railway operating agency should make an effort to increase the perceived ease of use and usefulness of the urban railway to improve the service quality, to positively change the users' attitudes toward use, and to make the positive change connected to the intention of reuse and intention of recommendation, the users' behavior intentions.

Multiuser Resource Allocation Scheme Considering Link Layer Effective Capacity in OFDMA Systems (직교 주파수 분할 다원 접속 시스템에서 실효 링크 계층 용량을 고려한 다중 사용자 자원 할당 기법)

  • Sung Si-Hwan;Yoo Myung-Sik;Shin Yo-An;Lee Won-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6B
    • /
    • pp.508-516
    • /
    • 2006
  • The explosive growth of wireless network users and the existence of various wireless services have demanded high rate throughput as well as user's QoS guarantees. Towards this, this paper proposes QoS-oriented subcarrier allocation scheme considering the QoS provisioning of multiple users, which is major requirement for wireless network design point of view. This paper introduces joint RR/K&H combined with M-LWDF(Modified Largest Weighted Delay First) scheme throughout observing statistical channel behavior and real time queuing analysis for appropriate resource allocation tightly connected to multiuser scheduling. Accordingly, the system throughput can be enhanced, and the QoS demanded for delay sensitive services can be satisfied. Furthermore, the proposed scheme is applied for OFDMA(Orthogonal Frequency Division Multiple Access) systems to allocate sub-carriers in optimal way. The simulation results verify plausible performances of proposed resource allocation scheme via showing superior effective capacity under time-varying physical-layer channel behaviors.

Measures for Adware and Spyware (애드웨어 및 스파이웨어 대응기법)

  • Kim, Bae-Hyun;Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.41-47
    • /
    • 2006
  • Spyware is any technology that aids in gathering information about a person or organization with-out their knowledge. Software designed to serve advertising, known as adware, can usually be thought of as spyware as well because it almost invariably includes components for tracking and reporting user information. A piece of spyware and adware affect computers which can rapidly become infected with large numbers of spyware and adware components. Users frequently notice from un-wanted behavior and degradation of system performance, such as significant unwanted CPU activity, disk usage, and network traffic which thereby slows down legitimate uses of these resources. The presence of situation will continue because of rapid expansion of Internet usages. Therefore, security solutions, such as anti-adware and anti-spyware, for recovering these malfunction due to the malicious programs must be developed. However, studies on the malicious programs are still not sufficient. Accordingly, this paper has studied the malicious program techniques, based on the results of analysis of present adware and spyware techniques by employing collected samples, and presents efficient measures for blocking and remedying the malicious programs.

  • PDF