• Title/Summary/Keyword: user-centric

Search Result 226, Processing Time 0.024 seconds

Meta-Analysis of Information Privacy Using TSSEM (TSSEM을 이용한 정보 프라이버시 메타분석)

  • Kim, Jongki
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.149-156
    • /
    • 2019
  • With widespread use of information technologies, information privacy issues have been gaining more attention by not only the public but also researchers. The number of studies on the issues has been increasing exponentially, which makes incomprehensible the whole picture of research outcome. Thus, it is necessary to conduct a systematic examination of past research. This study developed two competing models with four essential constructs in information privacy research and empirically tested the models with data obtained from previous studies. This study employed a quantitative meta-analysis method called TSSEM. It is one of MASEM methods in which structural equation modeling and meta-analysis are integrated. The analysis results indicated that risk-centric model exhibited much better model fits than those of concern-centric model. This study implies that traditional concern-centric model should be questioned it's explanatory power of the model and researchers may consider alternative risk-centric model to explain user's intention to provide privacy information.

Research on User-Centric Inter-Organizational Collaboration (UCICOIn) framework (사용자 제어 기반 다중 도메인 접근 제어에 대한 연구)

  • Sunghyuck Hong
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.37-43
    • /
    • 2023
  • In today's business landscape, collaboration and interoperability are crucial for organizational success and profitability. However, integrating operations across multiple organizations is challenging due to differing roles and policies in Identity and Access Management (IAM). User-centric identity (UCI) adopts a personalized approach to digital identity management, centering on the end-user for authentication and access control. It provides a decentralized system that ensures secure and customized access for each user. UCI aims to address complex security challenges by aligning access privileges with individual user requirements. This research delves into UCI's ability to streamline resource access amidst conflicting IAM roles and protocols across various organizations. The study presents a UCI-based multi-domain access control (MDAC) framework, which encompasses an ontology, a unified method for articulating access roles and policies across domains, and software services melding with UCI infrastructure. The goal is to enhance organizational resource management and decision-making by offering clear guidelines on access roles and policy management across diverse domains, ultimately boosting companies' return on investment.

Evaluating the Effectiveness of Nielsen's Usability Heuristics for Computer Engineers and Designers without Human Computer Interaction Background (비 HCI 전공자들을 대상으로 한 Nielsen의 Usability Heuristics에 대한 이해 정도 평가)

  • Jeong, YoungJoo;Sim, InSook;Jeong, GooCheol
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.2 no.2
    • /
    • pp.165-171
    • /
    • 2010
  • Usability heuristics("heuristics") are general principles for usability evaluation during user interface design. Our ultimate goal is to extend the practice of usability evaluation methods to a wider audience(e.g. user interface designers and engineers) than Human Computer Interaction(HCI) professionals. To this end, we explored the degree to which Jakob Nielsen's ten usability heuristics are understood by professors and students in design and computer engineering. None of the subjects received formal training in HCI, though some may have had an awareness of some HCI principles. The study identified easy-to-understand heuristics, examined the reasons for the ambiguities in others, and discovered differences between the responses of professors and students to the heuristics. In the course of the study, the subjects showed an increased tendency to think in terms of user-centric design. Furthermore, the findings in this study offer suggestions for improving these heuristics to resolve ambiguities and to extend their practice for user interface designers and engineers.

  • PDF

A Study on the Data Value: In Public Data (데이터 가치에 대한 탐색적 연구: 공공데이터를 중심으로)

  • Lee, Sang Eun;Lee, Jung Hoon;Choi, Hyun Jin
    • Journal of Information Technology Services
    • /
    • v.21 no.1
    • /
    • pp.145-161
    • /
    • 2022
  • The data is a key catalyst for the development of the fourth industry, and has been viewed as an essential element of the new industry, with technology convergence such as artificial intelligence, augmented/virtual reality, self-driving and 5 G. This will determine the price and value of the data as the user uses data in which the data is based on the context of the situation, rather than the data itself of the past supplier-centric data. This study began with, what factors will increase the value of data from a user perspective not a supplier perspective The study was limited to public data and users conducted research on users using data, such as analysis or development based on data. The study was designed to gauge the value of data that was not studied in the user's perspective, and was instrumental in raising the value of data in the jurisdiction of supplying and managing data.

A Comparative Study on Off-Path Content Access Schemes in NDN (NDN에서 Off-Path 콘텐츠 접근기법들에 대한 성능 비교 연구)

  • Lee, Junseok;Kim, Dohyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.12
    • /
    • pp.319-328
    • /
    • 2021
  • With popularization of services for massive content, the fundamental limitations of TCP/IP networking were discussed and a new paradigm called Information-centric networking (ICN) was presented. In ICN, content is addressed by the content identifier (content name) instead of the location identifier such as IP address, and network nodes can use the cache to store content in transit to directly service subsequent user requests. As the user request can be serviced from nearby network caches rather than from far-located content servers, advantages such as reduced service latency, efficient usage of network bandwidth, and service scalability have been introduced. However, these advantages are determined by how actively content stored in the cache can be utilized. In this paper, we 1) introduce content access schemes in Named-data networking, one of the representative ICN architectures; 2) in particular, review the schemes that allow access to cached content away from routing paths; 3) conduct comparative study on the performance of the schemes using the ndnSIM simulator.

Influence Factors of Effectively Executing NCW by User's Point of View (사용자 관점에서 본 효과적인 NCW 수행을 위한 영향요인)

  • Ou, Won-Suk;Chae, Myung-Sin;Yeum, Dae-Sung
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.109-127
    • /
    • 2010
  • The Network Centric Warfare(NCW) is based on the linkage of forces by network to employ them as they are centralized, even though they are scattered. Also it can be used to overcome spatiotemporal obstacles. Under the concept of NCW, cognitive and social areas are getting more weight than information technology and physical ones. In this study we tried to investigate the affecting factors to execute NCW effectively by user's point of view to place the focus on cognitive and social aspects. We obtained some affirmative results that affect to conduct NCW in Korea. The advanced western NCW can be applicable in theoretically in Korea, however to employ NCW more effectively we need Korean style NCW which portrays the Korean realities and circumstances.

Smart Tourism Design: A Semiotic Affordances Approach

  • Chulmo Koo;Jaehyun Park;William C. Hunter
    • Journal of Smart Tourism
    • /
    • v.3 no.2
    • /
    • pp.15-21
    • /
    • 2023
  • This paper presents a conceptual approach to Smart Tourism Design based on semiotic affordances theory. This conceptual approach repositions smart tourism from a techno-centric perspective that frames a seamless connection between the device and its software, to a more human-centric perspective that favors the user's needs, desires as perceived through the senses. An updated Smart Tourism Design emphasizes the aesthetic dimension of smart tourism that presents the objects of the travel experience as destination specific rather than universal, through representations as digital artifacts. This theory is based on an empirical and objective understanding of representations and how they can be identified as useful in the digital augmentation of travel experiences. Using Peirce's sign systems and Gibson's theory of affordances, smart tourism can transcend a prefabricated device-oriented experience to a closer dynamic and direct interaction between the user and the travel destination. Researchers and developers can use semiotics as a structural approach to recognizing objects as sign-types, and they can use affordances to better identify the immediacy of digital artifacts and purpose-driven by users' spontaneous and immediate motives.

A Study on Collection Method of IoT Information for The Adaptation of Web Services (웹 서비스 적용을 위한 IoT 정보 수집 방법에 관한 연구)

  • Sim, Sung-Ho;Han, Jung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.71-76
    • /
    • 2017
  • It is necessary to develop a service that meets various environmental requirements so that the Internet of things can be applied to the fourth industry in overall. This paper presents a method for extracting IoT devices information to change the current provider centric service provision environment in order to construct a user centered service provision environment for Web services. Also, it provides users to utilize the appropriate web services through taking advantage of IoT devices information. The existing service provision environment is focused on the method of selecting the service using the provider service information, thus, it is considered necessary for a user-oriented service search method to be in need. In this study, the service list is provided to the user by combining provider information and information extracted from IoT Devices. IoT information collection generates information by separating context information such as information between IoT devices and users and event information between devices through identifiers. In this paper, we propose a development of a user centric service environment by presenting users with a necessary service list through the proposed IoT information.