• 제목/요약/키워드: user contribution

검색결과 235건 처리시간 0.031초

Application of Motion Analysis to User Participation Behavior Model: Focused on Interactive Space

  • Kwon, Jieun;Nah, Ken
    • 대한인간공학회지
    • /
    • 제33권3호
    • /
    • pp.175-189
    • /
    • 2014
  • Objective: The goal of this research is to develop new user behavior model using user motion analysis with microscopic perspective for attracting user's participation in interactive space. Background: The interactive space is 'human's place', which is made up of complex elements of digital virtual space and traditional analog and physical environment based on human-computer interaction system. Human behavior has changed in it at the same time. If the user couldn't make participation in interaction, the purpose of the system is not met, which reduces its effect. Therefore, we need to focus on interactive space that is potential future direction from a new point of view. Method: For this research, we would discuss and study fields of interactive space; (1) finding definition of interactive space and studying background of theory about it. (2) providing base of user behavior model with study of user's context that is to be user information and motion. (3) examining user motion, classify basic motion type and making user participation behavior model in phases. Results: Through this process, user's basic twenty motions which are systematized are taken as a standard for analysis of interaction process and participation in interactive space. Then, 'NK-$I^5$ (I Five)' model is developed for user participation types in interactive space. There are five phases of user participation behavior: Imperception, Interest, Involvement, Immersion, and Influence. In this analysis, three indicators which are time, motion types, and user relationship are found to be related to participation. Conclusion: The capabilities and limitation of this research is discussed to attract user participation. This paper focuses especially on contribution of design to lead user's participation in interactive system and expectation to help adapt to user centered design of various interactive space with new aspect of user behavior research. Application: The results of the 'NK-$I^5$ (I Five)' model might help to realize successful interactive space based on user centered design.

reCAPTCHA 기술의 사회공헌성이 지속사용의도에 미치는 영향에 관한 연구 (A Study on the Effect of Social Contribution of reCAPTCHA Technology on the Continuance Intention to Use)

  • 윤승정;김민용
    • 한국IT서비스학회지
    • /
    • 제15권2호
    • /
    • pp.107-123
    • /
    • 2016
  • The purpose of this study is to find the continuance intention to use for reCAPTCHA technology which has information security and social contributions (decrypting archives) according to the user's pro-social level. In this research, reCAPTCHA technique generally gives users to information security and decrypting archives. However, as a result of preliminary survey, most users were not even aware of information security and social contributions (decrypting archives) functions. Therefore, in this research, we will measure with two kinds of focus. The first is the assumption that there will be also a difference in the continuance use depending pro-social level of the user of information technology, second we explain only the function of information security to the first group as well as decrypting archives to the second group. Generally, pro-social means that degree of understanding and supporting to the other people's interest, actions, needs, help, and care. In this research, we assume that if users have a low level of others care, they might evaluate that reCAPTCHA technology's social contributions is low. While they have a high level of others care, they recognize reCAPTCHA technology's social contribution is high and then they tend to use this technology continuously. Through this research, we finally find the most efficient way to increase the degree of continuance use of information technology.

A Methodology to Estimate the Unit Price of User Contribution in P2P Streaming System - A Case Study

  • Kim, Jung-Hyun;Moon, Sean;Kim, Gun-Hee;Kim, Hee-Jung;Park, Sung-Choon
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 2009년도 IWAIT
    • /
    • pp.376-380
    • /
    • 2009
  • Peer-to-Peer content delivery technology recently begins to be used not only for file sharing applications such as eDonkey but also for every kind of content services. KBS, a broadcasting company in Korea, is aggressively driving to apply Peer-to-Peer technology to KBS's commercial internet video service but we found that there are two big huddles. First, end users may refuse to share their own resources for KBS's cost reduction using Peer-to-Peer content delivery technology. Second, it may cause that the number of free-riders increases and the efficiency of the overall system would fall. From commercial service provider's perspective, we have to avoid that end users have unfavorable impressions on the service and the usefulness of Peer-to-Peer technology decreases. In order to overcome these problems, we studied how to offer incentive to end users and how much incentive would be reasonable, and then applied the result to real service for verification.

  • PDF

중소기업 정보화수준 평가를 위한 정보시스템 감리모델 설계 (Design of Information Systems Audit Model for the Small and Medium Enterprise's Informatization Level Evaluation)

  • 김정환;김희완
    • 한국IT서비스학회지
    • /
    • 제14권4호
    • /
    • pp.105-120
    • /
    • 2015
  • Enterprise should determine the adoption and utilization of information systems would be a great help to increase management performance. So, it maintains continually the budget and the investment for informatization. However, there is a limit to clarify whether the investment in informatization is contributed to create business opportunities through corporate competitiveness certainty or not. We tend to recognize the information system as a simple means to support common business rather than being used to achieve the company's business performance and to remain competitive. It is not an easy problem for the quantitative evaluation and analysis on the effect of intangible, such as management performance measurement by introducing computerization project. Informatization level evaluation model for the harsh business environment, specifically the Small and Medium Enterprise is lacking. In this paper, we proposed the audit evaluation model of an Small and Medium Enterprise informatization level based on system quality, information quality, user satisfaction, and IT business contribution. The proposed audit evaluation model was evaluated in the information system users, and verified the suitability throughout the survey of the audit professionals.

비전 센서를 이용한 레이져 용접물의 용접성 평가에 관한 연구 (A Study on Weldability Estirmtion of Laser Welded Specimens by Vision Sensor)

  • 엄기원;이세헌;이정익
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 1995년도 추계학술대회 논문집
    • /
    • pp.1101-1104
    • /
    • 1995
  • Through welding fabrication, user can feel an surficaial and capable unsatisfaction because of welded defects, Generally speaking, these are called weld defects. For checking these defects effectively without time loss effectively, weldability estimation system setup isan urgent thing for detecting whole specimen quality. In this study, by laser vision camera, catching a rawdata on welded specimen profiles, treating vision processing with these data, qualititative defects are estimated from getting these information at first. At the same time, for detecting quantitative defects, whole specimen weldability estimation is pursued by multifeature pattern recognition, which is a kind of fuzzy pattern recognition. For user friendly, by weldability estimation results are shown each profiles, final reports and visual graphics method, user can easily determined weldability. By applying these system to welding fabrication, these technologies are contribution to on-line weldability estimation.

  • PDF

레이저 용접물 결함 평가에 대한 화상처리의 이용 (Application of Image Processing on the Laser Welded Defects Estimation)

  • 이정익;고병갑
    • 한국공작기계학회논문집
    • /
    • 제16권4호
    • /
    • pp.22-28
    • /
    • 2007
  • The welded defects are usually called user's unsatisfaction for appearance and functional usage. For checking these defects effectively without time loss, setup of weldability estimation system is an important for detecting whole specimen quality. In this study, after catching a rawdata on welded specimen profiles and treating vision processing with these data, the qualitative defects are estimated from getting these information by laser vision camera at first. At the same time, the weldability estimation for whole specimen is produced. For user friendly, the weldability estimation results are shown each profiles, final reports and visual graphics method. So, user can easily determined weldability. By applying these system to welding fabrication, these technologies are contribution to on-line setup of weldability estimation system.

WSN 환경에서 Biometric 정보를 이용한 사용자 인증 스킴의 안전성 분석 (Security Analysis to an Biometric Authentication Protocol for Wireless Sensor Networks)

  • 이영숙
    • 디지털산업정보학회논문지
    • /
    • 제11권1호
    • /
    • pp.59-67
    • /
    • 2015
  • A novel authentication mechanism is biometric authentication where users are identified by their measurable human characteristics, such as fingerprint, voiceprint, and iris scan. The technology of biometrics is becoming a popular method for engineers to design a more secure user authentication scheme. In terms of physiological and behavioral human characteristics, biometrics is used as a form of identity access management and access control, and it services to identity individuals in groups that are under surveillance. In this article, we review the biometric-based authentication protocol by Althobati et al. and provide a security analysis on the scheme. Our analysis shows that Althobati et al.'s scheme does not guarantee server-to-user authentication. The contribution of the current work is to demonstrate this by mounting threat of data integrity and bypassing the gateway node on Althobati et al.'s scheme. In addition, we analysis the security vulnerabilities of Althobati et al.'s protocol.

Factors Affecting User Adoption of E-Payment Services Available in Mobile Wallets in Saudi Arabia

  • Alswaigh, Noha Y.;Aloud, Monira E.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.222-230
    • /
    • 2021
  • Mobile wallets have been in continuous demand and developed over the past few years, especially during the COVID-19 pandemic. Several studies have examined user intentions and perspectives. This study develops a conceptual model combining behavioral factors with the technology acceptance model (TAM). The goal is to identify key factors that influence user's intention to adopt mobile payments. This study uses the TAM and the unified theory of acceptance and use of technology (UTAUT) models with additional factors. The additional factors are security, trust, facilitating conditions, and lifestyle compatibility. The study analyzes the results of a survey of 394 Saudi citizens conducted via an online survey. The results indicate that user attitudes and intentions are positively influenced by all of the factors. Perceived usefulness, perceived ease of use, lifestyle compatibility, and facilitating conditions are direct predictors of user behavior in accepting mobile wallet payments. This study provides an empirical contribution to the literature on mobile payment acceptance on the effect of perceived usefulness and lifestyle compatibility. The results demonstrate that about 26% of the respondents started using mobile wallet services because of the COVID-19 pandemic.

LTE에서 집중화된 DU 환경에서 P2P 스트리밍 서비스를 위한 최적의 자원 배분 방안 (An Optimal Resource Distribution Scheme for P2P Streaming Service over Centralized DU Environment in LTE)

  • 김양중;정일영
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제3권3호
    • /
    • pp.81-86
    • /
    • 2014
  • P2P를 이용한 스트리밍 서비스의 발달과 모바일 네트워크의 발달로 이동환경에서도 서비스 품질을 제공하려는 방안들이 제안되었다. 그럼에도 불구하고, 고속의 이동환경과 이기종 단말의 특성을 고려한 스트리밍 서비스들은 기존의 P2P가 갖는 이기적인 피어 문제로 인하여 피어간 대역폭 정체가 발생됨에 따라 원하는 품질을 제공받지 못하는 고질적인 문제를 갖고 있다. 또한 피어간의 최적화된 트래픽 지역화 방안을 갖지 않음으로 트래픽 증가에 따른 긴 지연 및 손실을 초래하기 쉬운 구조이다. 따라서 피어의 기여도를 이끌어내고 인센티브를 부여함으로써 서비스 차등을 제공함은 물론, 단말의 위치 정보에 따른 클러스터링 기법에 따른 피어선택을 제공하는 구조는 이용자와 서비스 제공자, 모두에게 서비스 품질과 효율성 측면에서 만족을 줄 수 있다. 본 논문에서는 피어의 기여와 이용자 단말의 위치에 따른 비용이 적용된 피어 선택에 따른 최적의 자원 배분 기법을 제안하며 이를 이용한 방법이 LTE와 같은 환경에서 보다 적응적이고 이용자의 서비스 만족을 높일 수 있다.

공공도서관의 지역문화발전 기여전략 연구 (The Contribution Strategy of Public Library to Local Cultural Development in Korea)

  • 윤희윤
    • 한국도서관정보학회지
    • /
    • 제46권4호
    • /
    • pp.1-20
    • /
    • 2015
  • 이 연구는 문화기반시설인 공공도서관의 지역문화발전 기여전략을 제시하는데 목적이 있다, 이를 위하여 먼저 공공도서관이 수행하는 업무와 지역문화발전의 상의적 수수관계를 바탕으로 기여도를 평가하고 한계를 적시하였다. 이어 공공도서관과 밀접한 지역문화를 지식문화, 독서문화, 학습문화, 대중문화, 여가문화로 구분하고 이들의 발전과 진흥을 위한 공공도서관의 기여전략(장서개발과 이용서비스 중심의 핵심역량 제고, 디지털 정보해득력 교육 지원기능 강화, 독서생활화를 위한 독서촉진과 저변확대, 평생학습(문화)프로그램 제공서비스의 최적화, 시설 공간의 개방화 및 친숙성 증대, 지역 유관기관과의 연계 협력사업 확대)을 제안하였다.