• Title/Summary/Keyword: user behavior study

Search Result 1,173, Processing Time 0.024 seconds

Do Wearable Devices Change Behavior? A Study of Smart Fitness Trackers

  • Wan, Lili;Zhang, Chao
    • The Journal of Information Systems
    • /
    • v.29 no.1
    • /
    • pp.201-224
    • /
    • 2020
  • Purpose The study focuses on the physical activity behavior change effect of smart wristband, which is the most popular type of fitness tracker nowadays. The purpose of the research is to investigate how people's workout behavior may change after wearing a smart band and examine what kind of role persuasive design plays in behavior change. Design/Methodology/Approach This research employed an experimental study to examine whether the user's workout behaviors changed after using wristband from the "Behavior Wizard" perspective. A representative smart wristband from a major vendor was selected as the objects of experimental study. In the experiment, by comparing users' workout behavior before and after using the wristband, behavior changes of all the experiment participants were classified into one of the 15 behavior change types. Users perceived persuasive design characteristics were measured and group differences were tested among different behavior change groups. Findings This research found that nearly half of the participants changed their workout behavior while half retained their workout status or no exercise status. Half of the participants who did not do exercise in their spare time started walking in the experiment. Results also showed that participants who started working out perceived higher levels of persuasive design devised into the smart band than participants who preserved no exercise status, except for facilitation and reward strategies. Participants who retained workout and those who increased workout frequency perceived no difference in smart band persuasive design.

A Study on Factors Influencing User's Security Behavioral Intention for Choosing Password (패스워드 선택을 위한 사용자의 보안행위의도에 영향을 미치는 요인)

  • Kim, Jong-Ki;Kang, Da-Yeon;Jeon, Jin-Hwan
    • The Journal of Information Systems
    • /
    • v.17 no.1
    • /
    • pp.23-43
    • /
    • 2008
  • Nowadays, openness and accessibility of information systems increase security threats from inside and outside of organization. Appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. This study emphasizes on choosing passwords from perspective of information security and investigated user's security awareness affecting behavioral intention. The research model proposed in this study includes user's security belief which is influenced by risk awareness factors such as information assets, threats and vulnerability elements. The risk awareness factors ale derived from risk analysis methodologies for information security. User's risk awareness is a factor influencing the security belief, attitude toward security behavior, and security behavioral intention. According to the result of this study, while vulnerability is not related to the risk awareness, information assets and threats are related to the user's risk awareness. There is a significant relationship between risk awareness and security belief. Also, user's security behavioral intention is significantly affected by security attitude.

A Study on Public Libraries' User Behaviors Based upon Circulation Data in Gangseo and Yangcheon Region (대출기록을 통해 본 공공도서관 이용자 연구 - 강서·양천지역을 중심으로 -)

  • Heo, Sun;Chung, Yeon Kyoung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.4
    • /
    • pp.187-207
    • /
    • 2014
  • Public library user studies are required for better services and circulation records can be used as specific library data to identify common user patterns of the libraries. This study examined 754,198 of circulation data set - number of users, frequencies of circulation, volume of time of circulation and etc. The results of this study indicate the possibility of using circulation data to analyze the usage patterns in public libraries and to provide major types of users, collections, time of circulation, and common library user behaviors for better public library services.

A Configuration Methods of Sensor Reflecting User's Behaviors in the Ubiquitous House (유비쿼터스 주택에서의 사용자 행위에 따른 센서 기기 구성방법에 관한 연구 - 시나리오에 따른 사용자 행위 분석을 기반으로 -)

  • Lee, Dong-Hwa;Park, Sung-Jun;Lee, Hyun-Soo
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2005.10a
    • /
    • pp.111-114
    • /
    • 2005
  • The purpose of this study is to suggest configuration methods of sensor according to user's behaviors in the ubiquitous house. Recently, with appearing the concept of 'Ubiquitous', the applications of ubiquitous technologies on the our environment adopt a new paradigm. This new paradigm leads to the possibility of creating more intellectual dwelling environment according to user's behaviors. This paper suggests to change our dwelling by considering both engineering technology and considering the character of dwelling, because the house should provide causes humans with comfortability. Therefore, we need to understand user's behaviors in the dwelling, towards user friendly environment.

  • PDF

Continuous Human Activity Detection Using Multiple Smart Wearable Devices in IoT Environments

  • Alshamrani, Adel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.221-228
    • /
    • 2021
  • Recent improvements on the quality, fidelity and availability of biometric data have led to effective human physical activity detection (HPAD) in real time which adds significant value to applications such as human behavior identification, healthcare monitoring, and user authentication. Current approaches usually use machine-learning techniques for human physical activity recognition based on the data collected from wearable accelerometer sensor from a single wearable smart device on the user. However, collecting data from a single wearable smart device may not provide the complete user activity data as it is usually attached to only single part of the user's body. In addition, in case of the absence of the single sensor, then no data can be collected. Hence, in this paper, a continuous HPAD will be presented to effectively perform user activity detection with mobile service infrastructure using multiple wearable smart devices, namely smartphone and smartwatch placed in various locations on user's body for more accurate HPAD. A case study on a comprehensive dataset of classified human physical activities with our HAPD approach shows substantial improvement in HPAD accuracy.

What happens after IT adoption?: Role of habits, confirmation, and computer self-efficacy formed by the experiences of use (정보기술 수용 후 주관적 지각 형성: 사용 경험에서 형성된 습관, 기대일치, 자기효능감의 역할)

  • Kim, Yong-Young;Oh, Sang-Jo;Ahn, Joong-Ho;Jahng, Jung-Joo
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.25-51
    • /
    • 2008
  • Researchers have been continuously interested in the adoption of information technology (IT) since it is of great importance to the information systems success and it is also an important stage to the success. Adoption alone, however, does not ensure information systems success because it does not necessarily lead to achieving organizational or individual objectives. When an organization or an individual decide to adopt certain information technologies, they have objectives to accomplish by using those technologies. Adoption itself is not the ultimate goal. The period after adoption is when users continue to use IT and intended objectives can be accomplished. Therefore, continued IT use in the post-adoption period accounts more for the accomplishment of the objectives and thus information systems success. Previous studies also suggest that continued IT use in the post-adoption period is one of the important factors to improve long-term productivity. Despite the importance there are few empirical studies focusing on the user behavior of continued IT use in the post-adoption period. User behavior in the post-adoption period is different from that in the pre-adoption period. According to the technology acceptance model, which explains well about the IT adoption, users decide to adopt IT assessing the usefulness and the ease of use. After adoption, users are exposed to new experiences and they shape new beliefs different from the thoughts they had before. Users come to make decisions based on their experiences of IT use whether they will continue to use it or not. Most theories about the user behaviors in the pre-adoption period are limited in describing them after adoption since they do not consider user's experiences of using the adopted IT and the beliefs formed by those experiences. Therefore, in this study, we explore user's experiences and beliefs in the post-adoption period and examine how they affect user's intention to continue to use IT. Through deep literature reviews on the construction of subjective beliefs by experiences, we draw three meaningful constructs which theoretically have great impacts on the continued use of IT: perceived habit, confirmation, and computer self-efficacy. Then, we examine the role of the subjective beliefs on the cognitive/affective attitudes and intention to continue to use that IT. We set up a research model and conducted survey research. Since IT use implies interactions among a user, IT, and a task, we carefully selected the sample of users using same/similar IT to perform same/similar tasks, to exclude unwanted influences of other factors than subjective beliefs on the IT use. We also considered that the sample of users were able to make decisions to continue to use IT volitionally or at least quasi-volitionally. For each construct, we used measurement items recognized for reliability and widely used in the previous research. We slightly modified some items proper to the research context and a pilot test was carried out for forty users of a portal service in a university. We performed a full-scale survey after verifying the reliability of the measurement. The results show that the intention to continue to use IT is strongly influenced by cognitive/affective attitudes, perceived habits, and computer self-efficacy. Confirmation affects the intention to continue indirectly through cognitive/affective attitudes. All the constructs representing the subjective beliefs built by the experiences of IT use have direct and/or indirect impacts on the intention of users. The results also show that the attitudes in the post-adoption period are formed, at least partly, by the experiences of IT use and newly shaped beliefs after adoption. The findings suggest that subjective beliefs built by the experiences have deep impacts on the continued use. The results of the study signify that while experiencing IT in the post-adoption period users form new beliefs, attitudes, and intentions which may be different from those of the pre-adoption period. The results of this study partly demonstrate that the beliefs shaped by the behaviors, those are the experiences of IT use, influence users' attitudes and intention. The results also suggest that behaviors (experiences) also change attitudes while attitudes shape behaviors. If we combine the findings of this study with the results of the previous research on IT adoption, we can propose a cycle of IT adoption and use where behavior shapes attitude, the attitude forms new behavior, and that behavior shapes new attitude. Different from the previous research, the study focused on the user experience after IT adoption and empirically demonstrated the strong influence of the subjective beliefs formed in the post-adoption period on the continued use. This partly confirms the differences between attitudes in the pre-adoption and in the post-adoption period. Users continuously change their attitudes and intentions while experiencing (using) IT. Therefore, to make users adopt IT and to make them use IT after adoption is a different problem. To encourage users to use IT after adoption, experiential variables such as perceived habit, confirmation, and computer self-efficacy should be managed properly.

A study on the Residents¡?Behavior for the Planning of the Shared Community Space (공동주택단지의 공동생활공간 구성을 위한 거주자 사용행태 특성에 관한 연구)

  • 조성희;강혜경
    • Journal of the Korean housing association
    • /
    • v.13 no.3
    • /
    • pp.103-113
    • /
    • 2002
  • The purpose of this study is to find out the characteristics of users'behavior for the planning of the shared community space(SCS). It was analyzed and estimated that the present status of the SCS of the contemporary multi-family housing sites in Korea and the residents'behavior in the SCS. Theoretic investigation and empirical research methods were used in this study. The empirical survey focused on seeking out user-oriented design criteria, based on the analysis of residents'usage behavior for the SCS. The analysis was made by both quantitative and qualitative methods. The results of this study are as follows; First, as to the usage status survey for the SCS, there is a difference in the degree of usage according to their locations. Second, as to the analysis of the SCS through a mental map, the sketch map analysis is found to be a useful research method for the SCS planning by actualizing the residents'behavior characteristics. In detail, the main characteristics in the SCS planning are nearness, centrality, intimacy, combination of facilities and the connection with the main paths of the complex.

Study and analysis of the user behavior pattern on local tax notices (지방세 고지서 사용자의 이용행태 분석 연구)

  • Park, Jinhee
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.291-296
    • /
    • 2014
  • Most notices on local tax are perceived to be confusing, often leading to a negative feeling towards user due to the complex content and excessive information included in the tax forms. Several local governments have redesigned their notice forms in order to resolve these issues. Therefore I conducted an in-depth analysis of user experiences in regards to the issues posed by the design of the tax notice form so as to offer a basic set of data that can be used to improve the user experience and increase their understanding of the tax form.

A study on user scenario design using remote user behavior analysis tool - Case : online news service project (원격 사용자 행동 분석 툴을 활용한 사용자 시나리오 도출에 관한 연구-온라인 뉴스 서비스 프로젝트를 중심으로)

  • Hong, Sae-Ro-Na;Lee, Rick;Shim, Min-Jung;Oh, Ki-Tae;Lee, Kun-Pyo
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02b
    • /
    • pp.313-319
    • /
    • 2006
  • 쇼핑, 음악, 영화 등 오프라인에서 즐기던 많은 서비스가 이제는 온라인화 되어 일상화되었다. 그 중 뉴스의 경우도 미국의 리서치업체가 조사한 결과에 따르면, 인터넷 사용자의 21%가 온라인 뉴스를 오프라인보다 더 선호할 뿐만 아니라 온라인에 대한 선호도가 비약적으로 늘고 있다고 밝혔다. 종이 페이퍼로 뉴스를 제공할 때는 정보를 제공하는 공간이 제한적이기 때문에 사용자의 행위를 어느 정도 예상할 수 있다. 그러나 상대적으로 온라인 뉴스와 같은 컨텐츠 서비스는 하이퍼텍스트를 기본으로 하기 때문에 사용자의 패턴을 정확히 파악하기가 쉽지 않다. 컨텐츠 서비스 사용 행위를 분석하기 위해 아이트랙킹, 인뎁스인터뷰 등 여러 방법론을 적용할 수 있으며, 아이트랙킹 연구는 Poynter Institute 에서 2004년도에 진행한 사례가 있지만 여전히 컨텐츠 서비스에서의 핵심 이슈인 컨텐츠 영역에 대한 관심도, 영역별 연관성 파악 등에 대한 객관적 데이터가 부족하다. 따라서 본 논문은 컨텐츠 서비스 사용자의 유저 시나리오 도출을 위해 온라인 뉴스를 대상으로 한 분석 케이스를 소개한다. 본 사용자 행동 분석 리서치 수행을 위해 원격툴을 개발하였으며, 이 툴을 실제로 적용해봄으로써 컨텐츠 서비스 분석시 가능성과 고려사항들을 함께 살펴본다.

  • PDF

A Study on Recommendation Systems based on User multi-attribute attitude models and Collaborative filtering Algorithm (다속성 태도 모델과 협업적 필터링 기반 장소 추천 연구)

  • Ahn, Byung-Ik;Jung, Ku-Imm;Choi, Hae-Lim
    • Smart Media Journal
    • /
    • v.5 no.2
    • /
    • pp.84-89
    • /
    • 2016
  • For a place-recommendation model based on user's behavior and multi-attribute attitude in this thesis. We focus groups that show similar patterns of visiting restaurants and then compare one and the other. We make use of The Fishbein Equation, Pearson's Correlation Coefficient to calculate multi-attribute attitude scores. Furthermore, We also make use of Preference Prediction Algorithm and Distance based method named "Euclidean Distance" to provide accurate results. We can demonstrate how excellent this system is through several experiments carried out with actual data.