• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.027 seconds

An Explorative Study on the Features of Activity Trackers as IoT based Wearable Devices (사물인터넷 기반 웨어러블 디바이스인 활동량측정기의 특성에 대한 탐색연구)

  • Hong, Suk-Ki
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.93-98
    • /
    • 2015
  • IoT (Internet of Things) is recently burgeoning as business applications as well as ICT itself. Among the business applications of IoT, wearable devices are recognized as a leading area of customer devices. This research first identifies customer needs of activity trackers (fitness trackers), as one of representative wearable devices, and mapping the identified needs with the well-known marketing model of marketing mix (4 P's: Product, Price, Promotion, and Place). Survey was applied to university students for identifying current and potential needs for activity trackers. The needs were classified by 4 P's, and according to the results, different from other IT devices, activity trackers has more potential needs. Moreover, reliable distribution channels, offline and company owned shops were preferred, rather than online shopping mall by third parties. The results would provide some valuable implications to not only designers of activity trackers but also business management.

A Study on the Behavior of Internet Shopping Mall in Korea and China University Students (한국과 중국 대학생의 인터넷쇼핑몰 이용행태에 관한 연구)

  • Kim, Min-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.193-202
    • /
    • 2019
  • In this study, we want to check if there are similarities and differences between Chinese students and Korean university students who make up the highest percentage of Korean students studying abroad and see what attributes affect their satisfaction with the use of Internet shopping malls. Based on the results, Chinese students will be able to suggest ways to increase their satisfaction in the process of using local Internet shopping malls and advise companies operating domestic Internet shopping malls on strategies to improve the satisfaction of foreign customers. According to the study, among the system evaluation factors experienced by Korean students and Chinese students when using Internet shopping malls, Korean students showed better information quality than their Chinese counterparts, and Chinese students showed better functionality than their Korean counterparts. Second, among the logistics system evaluation factors Korean and Chinese students experienced when using Internet shopping malls, both speed and delivery quality showed that Korean students were better than Chinese students. Third, when Korean students use local Internet shopping malls, the factors that affect their satisfaction with consumption were found to have significant effects on functionality, delivery quality, response reliability, information quality and speed. Fourth, Chinese students studying abroad showed that functionality, information quality, speediness and response reliability all had a significant impact on satisfaction, except for delivery quality.

A Study on the Effects of the Characteristics of e-Learning Contents on the Repurchase Intention mediated by Trust and Relationship Commitment (e-Learning컨텐츠의 특징이 재구매 의도에 영향을 미치는 요인에 관한 연구 - 신뢰, 관계몰입의 매개효과를 중심으로)

  • 정인근;이명무
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.11a
    • /
    • pp.129-132
    • /
    • 2003
  • 본 연구에서는 사이버 교육(e-Learning)에서 컨텐츠 정보특성, 인터페이스 특성, 브랜드인지도, 부가서비스 제공 여부, 강사의 능력, 기술인프라 정도, 놀이성, 지각위험 등이 전반적인 만족도, 신뢰, 몰입 및 재구매 의도에 미치는 영향에 관하여 연구하고자 한다. 연구의 대상은 세 가지로 나누어 기업의 사내교육대상자, 학원 등 사교육대상자 및 대학교육대상자 등의 사이버 교육의 피교육자 유형에 따라 어떠한 e-Learning의 특성이 전반적인 만족도, 신뢰, 몰입 및 재구매 의도에 영향을 미치는가를 조사하기 위한 것이다. 연구모형에 포함된 변수는 기존의 연구에 근거하되 e-Learning의 특성적 요인을 포함하여 선정하였다. 사이버 공간에서 구매행위에 관한 연구는 다수의 연구자들(Jarvenpaa 등, 1997; Eugene 등, 1995; Parasuraman 등 1996; Spiller 등, 1998; O'keefs 등, 1998, Li, 등, 1999; Donthu 등, 1999; Macintosh 등, 1997; Garbarino 등, 1999)에 의해 다양한 방법으로 연구가 진행되었지만 본 연구에서는 e-Loaming의 환경적 특성에서 종합적 연구를 하고자 한다. 따라서 기존의 인터넷 환경 하에서 행해진 인터넷 컨텐츠의 특성에 관한 연구를 기반으로 사이버 교육(e-Loaming)의 특성과 부합하는 변수들을 연구 모형에 포함하였으며, 또한 사이버 교육에서 새롭게 부각되는 요인들을 부가하여(이승희, 2001; 박광태 등, 2002; Bonk, 2002; Learning Decisions, 2001) 연구모형을 설정하고 이를 근거로 실증연구를 수행 중에 있다.

  • PDF

A Fault-Tolerant Mobile Agent Framework and Replication Study for Internet Applications (인터넷 응용을 위한 고장 감내 이동 에이전트 프레임워크와 레플리케이션 연구)

  • Park, Kyeong-mo
    • The KIPS Transactions:PartA
    • /
    • v.10A no.6
    • /
    • pp.701-708
    • /
    • 2003
  • This paper addresses the issue involved in dependability of distributed mobile agents in the Internet environment. We propose an architectural framework for the Internet applications making mobile agents into fault-tolerant. The replication of agents and data is of great importance to achieve fault tolerance in distributed systems over the Internet. This research focuses on the replication component for the proposed fault-tolerant mobile agent framework. We present and analyze the performance results obtained when doing simulation study on the effects of the degree of replication, the active and passive replication strategies, and the replication scale.

Air Threat Evaluation System using Fuzzy-Bayesian Network based on Information Fusion (정보 융합 기반 퍼지-베이지안 네트워크 공중 위협평가 방법)

  • Yun, Jongmin;Choi, Bomin;Han, Myung-Mook;Kim, Su-Hyun
    • Journal of Internet Computing and Services
    • /
    • v.13 no.5
    • /
    • pp.21-31
    • /
    • 2012
  • Threat Evaluation(TE) which has air intelligence attained by identifying friend or foe evaluates the target's threat degree, so it provides information to Weapon Assignment(WA) step. Most of TE data are passed by sensor measured values, but existing techniques(fuzzy, bayesian network, and so on) have many weaknesses that erroneous linkages and missing data may fall into confusion in decision making. Therefore we need to efficient Threat Evaluation system that can refine various sensor data's linkages and calculate reliable threat values under unpredictable war situations. In this paper, we suggest new threat evaluation system based on information fusion JDL model, and it is principle that combine fuzzy which is favorable to refine ambiguous relationships with bayesian network useful to inference battled situation having insufficient evidence and to use learning algorithm. Finally, the system's performance by getting threat evaluation on an air defense scenario is presented.

Extraction of System-Wide Sybil-Resistant Trust Value embedded in Online Social Network Graph (온라인 소셜 네트워크 그래프에 내포된 시스템-차원 시빌-저항 신뢰도 추출)

  • Kim, Kyungbaek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.533-540
    • /
    • 2013
  • Anonymity is the one of main reasons for substantial improvement of Internet. It encourages various users to express their opinion freely and helps Internet based distributed systems vitalize. But, anonymity can cause unexpected threats because personal information of an online user is hidden. Especially, distributed systems are threatened by Sybil attack, where one malicious user creates and manages multiple fake online identities. To prevent Sybil attack, the traditional solutions include increasing the complexity of identity generation and mapping online identities to real-world identities. But, even though the high complexity of identity generation increases the generation cost of Sybil identities, eventually they are generated and there is no further way to suppress their activity. Also, the mapping between online identities and real identities may cause high possibility of losing anonymity. Recently, some methods using online social network to prevent Sybil attack are researched. In this paper, a new method is proposed for extracting a user's system-wide Sybil-resistant trust value by using the properties embedded in online social network graphs. The proposed method can be categorized into 3 types based on sampling and decision strategies. By using graphs sampled from Facebook, the performance of the 3 types of the proposed method is evaluated. Moreover, the impact of Sybil attack on nodes with different characteristics is evaluated in order to understand the behavior of Sybil attack.

Improved Initial Costs Expectation Model based on FPA for Internet Banking System (인터넷 뱅킹 시스템을 위한 개선된 FP 기반 초기 규모 예측 모델)

  • Yun, Gwang Yeul;Yoo, Hae Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.4
    • /
    • pp.139-148
    • /
    • 2014
  • With the development of IT, the financial sector has grown dramatically in Non face-to-face channel. However, because the initial costs calculation model which reflects the characteristics of the financial system does not exist, deteriorating reliability of budget establishment and low-price booking competition appeared. This negative situation leads to degradation of Internet Banking systems and customers who use these financial products have many troubles. Therefore, this paper improves the Initial Costs Expectation Model based on FPA & Expert Judgement Model. And it verified the effectiveness of this model through the regression analysis. As a result, we developed the Initial Costs Expectation Model for Internet Banking systems based on FPA, which is increased in accuracy than existing Cost Expectation Models.

A Study of a Hierarchical Grade-based Contents Forwarding Scheme for CCN Real-time Streaming Service (CCN 실시간 스트리밍 서비스를 위한 계층별 차등기반의 데이터 전송 기법 연구)

  • Kim, Taehwan;Kwon, Taewook
    • Journal of KIISE
    • /
    • v.44 no.11
    • /
    • pp.1219-1230
    • /
    • 2017
  • Real-time streaming services over the Internet have increased with the explosive growth of the various mobile platforms, with a focus on smart phones, and the demand for them is growing. In addition, the bandwidth occupied by the streaming services over the Internet had already surpassed 50% in 2010. Because of the shortage of network bandwidth for multimedia services traffic, restrictions on quality and capacity will become more and more serious. CCN is a future Internet architecture that improves how existing host-based Internet architecture handles content-oriented structure, but it is designed for the transmission of general contents and is not suitable for transmitting real-time streaming contents. In this paper, we focus on the inefficient aspects of CCN and propose a hierarchical grade-based scheme for real-time service for a more efficient environment in real-time streaming services. Experiments have shown better performance in terms of bandwidth, network load, and reliability.

A Study on Health Information and Medical Consulting via Internet Focusing on the Age Group of 20s (인터넷을 활용한 건강정보 및 의료상담에 관한 연구 (20대를 중심으로))

  • Rhee, Hyun-Sill;Lee, Kyung-Sook;Kim, Mi-Sun;Hwang, Seung-Hwan;Kim, Dong-Soo;Woo, Jong-Won;Mun, Dae-Hun;Ryu, Jin-Sol;Lee, Tae-Ro
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.255-267
    • /
    • 2012
  • High Internet usage and the public's keen interest on health have influenced the health care system, and a potential value of the online health information and medical consultation market is immense. This study reveals results from data collected from Seoul residents in the age group of 20s in 2011. Out of 499 respondents, 75.2% answered that they used online health information; however, only 7.2% answered that they have used online medical consultation services. Findings on the purposes of using online medical consultation included treatments of symptoms(33.6%) and self-disciplines of one's health(19.5%). Mostly used Websites for health information search included search engines and blogs, but respondents preferred to use government sites and hospital sites in the future. When choosing a medical consultation, respondents preferred a certain website for different reasons including creditability of the consultant(23.7%), creditability of the organization(23.7%), rapid responses(21.2%), and more. Overall, although health information search via web is being highly utilized among people in their 20s, utilization of online medical consulting is not. Thus, promotion efforts to increase awareness and utilization of online medical consulting based on the site selection criteria, type of personal information disclosure, and other preferences are essential. Also, creating websites meeting these criteria is important.

An Exploratory Study on the Trustworthiness Analysis of Generative AI (생성형 AI의 신뢰도에 대한 탐색적 연구)

  • Soyon Kim;Ji Yeon Cho;Bong Gyou Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.79-90
    • /
    • 2024
  • This study focused on user trust in ChatGPT, a generative AI technology, and explored the factors that affect usage status and intention to continue using, and whether the influence of trust varies depending on the purpose. For this purpose, the survey was conducted targeting people in their 20s and 30s who use ChatGPT the most. The statistical analysis deploying IBM SPSS 27 and SmartPLS 4.0. A structural equation model was formulated on the foundation of Bhattacherjee's Expectation-Confirmation Model (ECM), employing path analysis and Multi-Group Analysis (MGA) for hypothesis validation. The main findings are as follows: Firstly, ChatGPT is mainly used for specific needs or objectives rather than as a daily tool. The majority of users are cognizant of its hallucination effects; however, this did not hinder its use. Secondly, the hypothesis testing indicated that independent variables such as expectation- confirmation, perceived usefulness, and user satisfaction all exert a positive influence on the dependent variable, the intention for continuance intention. Thirdly, the influence of trust varied depending on the user's purpose in utilizing ChatGPT. trust was significant when ChatGPT is used for information retrieval but not for creative purposes. This study will be used to solve reliability problems in the process of introducing generative AI in society and companies in the future and to establish policies and derive improvement measures for successful employment.