• Title/Summary/Keyword: 응답의 일관성

Search Result 152, Processing Time 0.024 seconds

Mediating Effects of Perceived Risk and Usefulness between Online Information Credibility and Intention to Use (온라인 정보의 신뢰성 및 정보 활용의도 사이의 지각된 위험과 유용성의 매개효과에 관한 연구)

  • Sun, Jonghak;Yoon, Jung-Hyeon
    • Management & Information Systems Review
    • /
    • v.33 no.4
    • /
    • pp.99-118
    • /
    • 2014
  • Using the theory of attribution, this study investigates the determinants if controllability and explores underlying dimensions of online information credibility, and then investigates if the credibility of online information influences the users' intention to use the online information for evaluating or judging the involved products. Moreover, as a research attempt to investigate the impacts of online information credibility, this study examines whether the main effect of perceived online information credibility on the intention of using online information to make a decision of purchase is mediated by both perceived risk and perceived usefulness. A total of 287 survey forms were collected from online consumers. We examined reliability by exploring internal consistency of the multiple item scales in the overall sample. Convergent and discriminant validity were also examined for evidence of construct validity. Then, PLS technique was employed to test the research model. As a result of analyzing data from a dataset of 287 responses via PLS technique, it is found that (1) both sources (controllability and stability) of perceived credibility are significantly associated with both perceived risk and perceived usefulness, and (2) perceived risk as well as perceived usefulness partially mediate the link between the two sources of credibility and intention to use. The findings of this study also suggest that the two dimensions of online information credibility influence information recipient's intention to use. Moreover, the online information including descriptions about controllability and stability can trigger potential consumers to perceive risk about consumption of the informed products and services. Therefore, providing online information with highly described controllability and stability can increase not only the credibility of the online information itself, but also the intention to use the online information through perceived risk and usefulness.

  • PDF

Answering User Queries on Online Learning Platforms through Natural Language Processing and Keyword Visualization Using Word Cloud (자연어처리를 통한 온라인 학습 플랫폼 사용자 질의 답변 및 Word cloud를 활용한 키워드 시각화)

  • Kyong Rok Yoo;Young-Seob Jeong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.351-354
    • /
    • 2024
  • 최근 온라인 학습의 비중이 증가함에 따라 온라인 학습 서비스의 일부인 온라인 상담 부분도 비례하여 증가하고 있으며, 많은 상담량으로 인해 상담 서비스의 품질이 저하되고 답변의 속도, 효율성도 감소하는 문제가 발생한다. 국내 교육기관에서는 서비스 개선과 사용자 맞춤형서비스를 제공하기 위해 다양한 연구를 진행하고 있으며 민원을 처리하는 챗봇 등 자동 답변 서비스 도입을 추진하고 있다. 챗봇 및 자동 답변 서비스는 서비스 제공자 입장에서 저예산으로 단순한 질문에 대하여 신속하고 효율적인 서비스를 제공할 수 있으며 서비스 이용자는 즉각적인 답변과 유사한 답변 예시를 확인함으로 질문을 빠르게 해결할 수 있는 장점이 있다. 국가 공공기관에서 제공하는 학습 서비스는 단순하고 반복적인 문의가 많고 정형적인 질의응답이 주로 등록이 되고 있다. 자동 답변 서비스는 이런 문제점을 해결할 수 있는 대안이 된다. 서비스 이용자가 등록한 문의를 기반으로 학습한 답변 서비스는 담당자의 반복된 업무처리 경감과 사용자의 답변감소, 일관된 답변처리로 서비스 품질개선에 큰 영향을 줄 수 있다. 본 연구에서는 사용자의 질문에 효율적인 답변 및 민원 처리 서비스를 제공할 수 있는 방법을 제시하며, 관리자의 업무능력 향상과 효율성을 위해 기간별 키워드 빈도수를 계산하여 Word cloud를 생성하여 제공함으로써 사용자들에게 일정 기간 내 빈도수가 높은 키워드 관련 공지 및 안내를 할 수 있도록 한다.

  • PDF

Outlier detection using Grubb test and Cochran test in clinical data (그럽 및 코크란 검정을 이용한 임상자료의 이상치 판단)

  • Sohn, Ki-Cheul;Shin, Im-Hee
    • Journal of the Korean Data and Information Science Society
    • /
    • v.23 no.4
    • /
    • pp.657-663
    • /
    • 2012
  • There are very small values and/or very big values which get out of the normal range for survey data in various fields. The reasons of occurrence for outlier are two. One of them is the error in process of data input and the other is the strange response of the respondent. If the data has outliers, then the summary statistics such as the mean and the variance produce misleading information. Therefore, researcher should be careful in detecting the outlier in data. In particular, it is very important problem for clinical fields because the cost of experiment is very high. This article introduce the Grubb test and Cochran test to detect outliers in the data and we apply this method for clinical data.

A Study on Development of the Measure of Effects for Pallets Standardization (파렛트 표준화의 효과평가척도 개발에 관한 연구)

  • Kim, Hyeon-Seung;Do, Hwa-Yong;Park, Dong-Ju;Choe, Chang-Ho
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.1
    • /
    • pp.97-105
    • /
    • 2009
  • It is expected that logistics standardization have an great effect on industry and national economy due to cost saving and improving efficiency. Therefore all countries of the world make a strenuous effort to take a lead of logistics standardization Despite such efforts of every country, our country remained a lukewarm attitude about logistics standardization. Especially, our country remained a lukewarm attitude about logistics standardization effect quantify. We have to suggest the necessity of standardization and the effect for carrying out logistics standard. So, this study performed literature review and case study for development of effect valuation method. Also, this study developed effect valuation standard for quantifiable standardization effect and drew the effect valuation standard model. First, the measure of preliminary effectiveness was chosen for MOE selection. As a results, vehicle load ratio, delivery cost, keeping space efficiency warehouse automation ratio, etc. were selected. Then, vehicle/truck load ratio, warehouse keeping efficiency, up unloading hour, packaging cost, consistency transportation ratio were chosen for MOE of pallet standardization.

Concurrency Control Using the Update Graph in Replicated Database Systems (중복 데이터베이스 시스템에서 갱신그래프를 이용한 동시성제어)

  • Choe, Hui-Yeong;Lee, Gwi-Sang;Hwang, Bu-Hyeon
    • The KIPS Transactions:PartD
    • /
    • v.9D no.4
    • /
    • pp.587-602
    • /
    • 2002
  • Replicated database system was emerged to resolve the problem of reduction of the availability and the reliability due to the communication failures and site errors generated at centralized database system. But if update transactions are many occurred, the update is equally executed for all replicated data. Therefore, there are many problems the same thing a message overhead generated by synchronization and the reduce of concurrency happened because of delaying the transaction. In this paper, I propose a new concurrency control algorithm for enhancing the degree of parallelism of the transaction in fully replicated database designed to improve the availability and the reliability. To improve the system performance in the replicated database should be performed the last operations in the submitted site of transactions and be independently executed update-only transactions composed of write-only transactions in all sites. I propose concurrency control method to maintain the consistency of the replicated database and reflect the result of update-only transactions in all sites. The superiority of the proposed method has been tested from the respondence and withdrawal rate. The results confirm the superiority of the proposed technique over classical correlation based method.

A Study on Developing Policy Indicators of Personal Information Protection for Expanding Secure Internet of Things Service (안전한 사물인터넷 서비스 확산을 위한 개인정보보호정책평가지표 개발에 관한 연구)

  • Shin, Young-Jin
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.29-51
    • /
    • 2018
  • As the core technology of the Fourth Industrial Revolution, the Internet of Things has been developed and has enabled various services, and personal information has been handled freely in the process. However, the infringement threat of personal information is increasing as more convenient services are provided and more information devices including smart devices are connected to the network. Therefore, this study is to analyze prioritizing personal information protection policy indicators in order to provide IoT services by constructing secure environment for implementing the Internet of things as the core technology of the 4th Industrial Revolution. This study reviewed personal information protection policy indicators based on the literature survey, and identified 3 fields, 9 areas, and 25 indicators through Delphi analysis for experts. The weights were calculated based on the AHP survey for 66 experts and the results were used to present the relative importance and priority of the policy indexes. The results of this study found the policy field was the most important, followed by the technical field, and the administrative field. Of the three areas of the policy field, strengthening the personal information protection laws related to IoT is the most important, while among the indicators, promoting and revising the personal information protection law related to IoT is the most important. Comparisons of the fields, areas, and indicators of IoT-related personal information protection policies found consistent values. The personal information protection policy indicators derived this way will contribute to the nation's competitiveness by expanding secure IoT policies in the future.

A Usability Testing on the Tablet PC-based Korean High-tech AAC Software (태블릿 PC 기반 한국형 하이테크 AAC 소프트웨어의 사용성 평가)

  • Lee, Heeyeon;Hong, Ki-Hyung
    • Journal of the HCI Society of Korea
    • /
    • v.7 no.2
    • /
    • pp.35-42
    • /
    • 2012
  • The purpose of this study was to evaluate the usability of the tablet PC-based Korean high-tech AAC(Augmentative Alternative Communication System) software. In order to develop an AAC software which is appropriate to Korean cultural/linguistic contexts and communication needs of the users, we examined the necessity and ease of use for the communication functions that are required in native Korean communication, such as polite expressions, tense expressions, negative expressions, subject-verb auto-matching, and automatic sentence generation functions, using a scenario-based user testing. We also investigated the users' needs, preferences, and satisfaction for the tablet PC-based Korean high tech AAC using a semi-structured and open questionnaires. The participants of this study were 9 special education teachers, 6 speech therapists, and 6 parents whose children had communication disabilities. The results of the usability testing of the tablet PC-based Korean high-tech AAC software presented positive responses in general, by indicating overall scores of above 4 out of 5 except in tense and negative expressions. The necessity and ease of use in the tense and negative expressions were evaluated relatively low, and it might be related to the inconsistent interface with the polite expressions. In terms of the user interface(UI), there were users' needs for clear visual feedback in the symbol selection and display, consistent interface for all functions, more natural subject-verb auto-matching, and spacing in the text within symbols. The results of the usability testing and users' feedback might serve as a guideline to compensate and improve the function and UI of the existing AAC software.

  • PDF

Collaborative Authoring System using 3D Spatio-Temporal Space (삼차원 시.공간을 이용하는 프레젠테이션 공동저작 시스템)

  • 이도형;성미영
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.6
    • /
    • pp.623-634
    • /
    • 2003
  • In this paper, we propose a collaborative multimedia authoring system. Our authoring system represents a multimedia presentation in a 3D coordinate system. One axis represents the traditional timeline information (T-zone), and the other two axes represent spatial coordinates (XY-zone). Our system represents a visual media objects as a 3D parallelepipeds and audio media objects as cylinders. This interface allows for simultaneous authoring and manipulation of both the temporal and the spatial aspects of a presentation. Using our system, users can design multimedia presentations collaboratively in the unified spatio-temporal space while freely traversing the spatial domain and the temporal domain without changing the context of authoring. In addition, we suggest an efficient mechanism of concurrency control for shared objects generated by our collaborative writing system. The mechanism is mainly based on the user awareness, the multiple versions, and the access permission of shared objects. Our concurrency control mechanism is designed to keep data consistency by minimizing the collision due to the delay or the failure of network communication and to allow maximum responsiveness for users using optimistic concurrency control. Also, the mechanism maximize the responsiveness by refining the locking granularity and applying different concurrency control mechanisms to each.

An Online Scaling Method for Improving the Availability of a Database Cluster (데이터베이스 클러스터의 가용성 향상을 위한 온라인 확장 기법)

  • Lee, Chung-Ho;Jang, Yong-Il;Bae, Hae-Yeong
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.935-948
    • /
    • 2003
  • An online scaling method adds new nodes to the shared-nothing database cluster and makes tables be reorganized while the system is running. The objective is to share the workload with many nodes and increase the capacity of cluster systems. The existing online scaling method, however, has two problems. One is the degradation of response time and transactions throughput due to the additional overheads of data transfer and replica's condidtency. The other is and inefficient recovery mechanism in which the overall scaling transaction is aborted by a fault. These problems deteriorate the availability of shared-nothing database cluster. To avoid the additional overheads throughout the scaling period, our scalingmethod consists of twophases : a parallel data transfer phase and a combination phase. The parallel data transferred datausing reduces the size of data transfer by dividing the data into the number of replicas. The combination phase combines the transferred datausing resources of spare nodes. Also, our method reduces the possibility of failure throughout the scaling period and improves the availability of the database cluster.

Item Goodness-of-Fit of Psychological Empowerment Scale in Private Security Guards (시큐리티 요원의 심리적 임파워먼트 척도의 문항 적합도)

  • Kim, Eui-Young;Kim, Sae-Hyung;Lee, Jun-Woo
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.25-45
    • /
    • 2012
  • Based on the results of preceding researches that the uncertainty perceived by the private security guards about their roles exerts direct effects on the business performance of the security industry, it needs to preferentially examine the degree of authority that the private security guards have. The suitability of the psychological empowerment criteria for measuring this for private security guards, however, has not yet been established up to the present, so it can be said that the validity of the information has not yet been established. Accordingly, as the psychological empowerment criteria of private security guards, this research examined the suitability of items, reliability of items, the level of difficulty of items, and the item goodness of fit from the viewpoint of the appropriateness of category of responses, and it is summarized as follows. First, in the self-determinism factor of the psychological empowerment criteria, Item 11 was found to be an unsuitable item, so it is proper that Item 11 should be deleted when examining the psychological empowerment of private security guards from now on. Second, the item reliability of the psychological empowerment criteria was high, so the consistency of the results is shown even if the data are collected from the other private security guards. Third, they feel that it is hard to respond to Item 12 while they perceive that Item 1 is the easiest, and the level of items of the psychological empowerment criteria is evenly distributed. Fourth, it was established that the 5-point categories of the psychological empowerment criteria were suitable to the private security guards.

  • PDF