• Title/Summary/Keyword: Application Usage

Search Result 1,323, Processing Time 0.023 seconds

An Empirical Study on the Efficacy of Mindfulness Activation Tools for Psychological Stability Support: A Focus on Voluntary Groups (심리 안정을 지원하는 현존의식 활성화 도구의 효용성 연구 - 자발적 포커스그룹 중심)

  • Joong Ho Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.383-388
    • /
    • 2024
  • This study conducted voluntary focus group user observations to empirically validate the efficacy of the self-developed psychological support mobile application, "Mindful Now". The app is structured as an interactive game format, enabling individuals to activate self-awareness of mindfulness states anytime, anywhere. It consists of a 3-step process of sensory/emotional/consciousness awareness, facilitating the expression of non-judgmental awareness. To demonstrate the effectiveness of this mindful activation in enhancing psychological well-being such as happiness and stress reduction, voluntary mindfulness mobile app usage was tracked among 49 university students. The results revealed significant improvements, with a 14.4% increase in SWLS happiness index and a 17.1% decrease in PSS-10 stress levels among 12 users who used the app continuously for over 60 days to practice mindfulness awareness. Particularly, higher app engagement was observed among students who initially reported relatively lower indices before using the app. The utilization of mobile apps that promote mindful activation aligns with various therapeutic paradigms based on mindfulness and meditation, contributing to advancements in digital therapeutic interventions for psychological support.

Indigenous traditional knowledge and ethnobotanical flora: a quantitative assessment of medicinal flora of Fateh Pur Thakyala, Azad Jammu, and Kashmir, Pakistan

  • Shakeel Sabir;Naveed Iqbal Raja;Rahmatullah Qureshi;Karamit Hussain
    • Journal of Ecology and Environment
    • /
    • v.48 no.3
    • /
    • pp.319-342
    • /
    • 2024
  • Background: The current study is the first quantitative ethnobotanical evaluation of Fateh Pur Thakyala, an unexplored area of Azad Kashmir, Pakistan. The exploration and quantification of ethnobotanical knowledge among people of the study area mainly focused during field survey. The study likely focuses on documenting and preserving the indigenous knowledge and practices related to medicinal plants in the region. A total 70 informants (45 males and 25 females) selected randomly to collect data were interviewed using semi structured questionnaire. The data like demographic characteristics of informants, methods of preparation, life form, modes of application, parts used, and ethnomedicinal uses was documented. The quantitative indices including relative frequency of citation (RFC), use value (UV), informant consensus factor (ICF), fidelity level (FL), consensus value for plant part (CPP), rank order priority (ROP), percentage respondent knowledge (PRK), were applied to analyze the collected data. Furthermore, primary data were also compared with fifteen papers published from adjoining areas by Jaccard index (JI). Results: The current study reported 135 medicinally important plants species belonging to 115 genera and 54 families. The dominating family was Asteraceae (14 sp.), followed by Fabaceae (11 sp.), Rosaceae (11 sp.), Lamiaceae (8 sp.), Moraceae (5 sp.), Solanaceae, Cyperaceae, Euphorbiaceae (4 sp.) and Poaceae, Sapindaceae, Rhamnaceae, Mrytaceae, Malvaceae (3 sp.) for each. The study revealed that there were small differences in usage of medicinal plants of different families. The herbaceous life form was dominating the study area with (79 sp.) used as herbal medicines followed by shrubs (23 sp.) and trees (33 sp.). The comparative study of for novelty of species and their uses by JI revealed 13 novel plants species which were not reported earlier from this region. Conclusions: Local inhabitants still prioritize herbal medicines as an effective way to treat a wide variety of ailments. Elders and health practitioners of the study area are well aware of indigenous knowledge about medicinal plants, but young people are not much interested in herbal practices. Thus, valuable knowledge about the use of plants is on the verge of decline. The overexploitation and seasonal fires are major threats for medicinal flora in the area.

The influences of individual personality types on ERP system's acceptance: a preliminary test (개인의 성격유형이 ERP수용에 미치는 영향에 관한 탐색적 연구)

  • Kim, Hyun-Sang;Lee, Jang-Hyung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.4
    • /
    • pp.47-65
    • /
    • 2006
  • The application of the ERP system is becoming more common to the businesses since a firm needs to reinforce positive competitiveness and to maintain competitive advantage. The ERP system is an enterprise integration solution that converts the whole business processes through information technology. Extant research provides plenty of results about the success factors of the ERP system; however, most of the researches focus on the exterior factors such as techniques rather than on the influences that a firm's employees' individual personality has in accepting the information technology of the ERP system. The objective of this study is to investigate the role of the employees' individual personality as a factor that makes the ERP system a success. The surveys--composed of the extent of information technology acceptance about the personality type of MBTI (Myers-Briggs type indicator) and the ERP system--were given to the companies applying the ERP system The personality type of MBTI is measured by 4 types of Myers, and Davis's TAM (technology acceptance model) is used for the information technology acceptance. The results of this study are summarized as follows. First the extraversion and the judging in the personality types of MBTI have a significant influence on the information technology acceptance of the ERP system. However, the thinking and the feeling in the personality types of MBTI were analyzed to not have a critical affect on the ERP system acceptance. Second as verified in the extant research the information technology acceptance verification related to the ERP system has a significant influence on perceived ease of use, perceived usefulness, behavioral intention and actual usage of the ERP system. The results of this study can be used for a successful application of the ERP system as follows. First it offers foundation of perception that the type of the individual personality is a significant key figure for the successful use of the ERP system. Second it provides a basis for the knowledge of combining the model of information technology acceptance and the psychological factors.

  • PDF

Effects of Paddy Soil Chemical Changes and Yield Components of Rice in Accordance with the Age and Usage of Organic Fertilizer and Chemical Fertilizers (유기질비료와 화학비료의 사용기간과 사용량에 따른 논토양 화학성 변화와 벼의 수량구성요소에 미치는 영향)

  • Oh, Tae-Seok;Kim, Chang-Ho;Kim, Seong-Min;Jang, Myoung-Jun;Park, Youn-Jin;Cho, Young-Koo
    • Korean Journal of Organic Agriculture
    • /
    • v.24 no.4
    • /
    • pp.969-980
    • /
    • 2016
  • This experiment was conducted to assess changes to the chemical properties of soil and applicability in a case of rice cultivation with organic fertilizers. The investigator applied organic fertilizers to rice cultivation for five years to examine changes to the chemical properties of soil and found that the experiment group of organic fertilizers made an ongoing increase in pH, organism content, and available phosphate content annually compared with the control group with no big differences according to the amounts of organic fertilizers used. As for the yield components, there were no statistical differences in the number of spikelets and grain filling rate between the experiment group of organic fertilizers and the control group. The experiment group recorded a higher level in 1,000 seeds weight and yield than the control group. Experiment Group 4 recorded the highest level at 29.11 kg of 1,000 seeds weight. Experiment Groups 3 and 4, which used 222 kg and 267 kg per 10 a, respectively, recorded 576 kg and 572 kg of yield, respectively, which were 4.7% and 4.1% higher than 549 kg of control group, respectively. As for the quality of brown rice, there were no statistical differences in the head rice percentage between the control and experiment group, both of which were in the range of 83.2-85.7%. As for the protein content, Experiment Groups 3 and 4, both of which used a lot of organic fertilizers, were in the range of 6.9-7.1%, which was lower than 7.5% of control group. Those findings indicate that the long-term application of organic fertilizers can improve the chemical properties of soil and increase the yield more than the conventional method of fertilizer application. The findings also suggest that it will be effective to apply 222 kg of organic fertilizers or more per 10 a.

A Study of Improvement for the Prediction of Groundwater Pollution in Rural Area: Application in Keumsan, Korea (농촌지역 지하수의 오염 예측 방법 개선방안 연구: 충남 금산 지역에의 적용)

  • Cheong, Beom-Keun;Chae, Gi-Tak;Koh, Dong-Chan;Ko, Kyung-Seok;Koo, Min-Ho
    • Journal of Soil and Groundwater Environment
    • /
    • v.13 no.4
    • /
    • pp.40-53
    • /
    • 2008
  • Groundwater pollution prediction methods have been developed to plan the sustainable groundwater usage and protection from potential pollution in many countries. DRASTIC established by US EPA is the most widely used groundwater vulnerability mapping method. However, the DRASTIC showed limitation in predicting the groundwater contamination because the DRASTIC method is designed to embrace only hydrogeologic factors. Therefore, in this study, three different methods were applied to improve a groundwater pollution prediction method: US EPA DRASTIC, Modified-DRASTIC suggested by Panagopoulos et al. (2006), and LSDG (Land use, Soil drainage, Depth to water, Geology) proposed by Rupert (1999). The Modified-DRASTIC is the modified version of the DRASTIC in terms of the rating scales and the weighting coefficients. The rating scales of each factor were calculated by the statistical comparison of nitrate concentrations in each class using the Wilcoxon rank-sum test; while the weighting coefficients were modified by the statistical correlation of each parameter to nitrate concentrations using the Spearman's rho test. The LSDG is a simple rating method using four factors such as Land use, Soil drainage, Depth to water, and Geology. Classes in each factor are compared by the Wilcoxon rank-sum test which gives a different rating to each class if the nitrate concentration in the class is significantly different. A database of nitrate concentrations in groundwaters from 149 wells was built in Keumsan area. Application of three different methods for assessing the groundwater pollution potential resulted that the prediction which was represented by a correlation (r) between each index and nitrate was improved from the EPA DRASTIC (r = 0.058) to the modified rating (r = 0.245), to the modified rating and weights (r = 0.400), and to the LSDG (r = 0.415), respectively. The LSDG seemed appropriate to predict the groundwater pollution in that it contained land use as a factor of the groundwater pollution sources and the rating of each class was defined by a real pollution nitrate concentration.

Compliance of Nasal Continuous Positive Airway Pressure in Patients with Obstructive Sleep Apnea Syndrome (폐쇄성 수면무호흡증 환자의 지속적 상기도 양압술 순응도)

  • Choi, Jong-Bae;Lee, Seung-Hee;Jeong, Do-Un
    • Sleep Medicine and Psychophysiology
    • /
    • v.13 no.1
    • /
    • pp.27-32
    • /
    • 2006
  • Objectives: Nasal continuous positive airway pressure (nCPAP) is the treatment of choice and has been shown to reduce the frequency of nocturnal respiratory events, improve sleep architecture, and decrease daytime sleepiness in patients with obstructive sleep apnea syndrome (OSAS). However, little is known about the compliance of nCPAP treatment in Korea. Our objective was to look into the nCPAP compliance and examine the factors influencing it. Methods: We reviewed the records of one hundred and twenty consecutive patients with OSAS referred for nocturnal polysomnography with nCPAP pressure titration during the period of January 1995 through April 1999 to the Seoul National University Hospital. We performed a telephone interview and obtained data from eighty-three patients. Results: In sixty patients who had accepted nCPAP treatment, twenty-six patients (43.3%) were still using nCPAP device, while thirty-four patients (56.7%) stopped using it. Fifteen patients (25%) were using nCPAP device everyday. In thirty-four patients who discontinued nCPAP use, twenty-five patients (73.5%) did within the first three months, and thirty-one (91.2%) within the first year. Significant predictor of long-term nCPAP use was the presence of subjective daytime sleepiness before nCPAP application. Conclusions: Long-term compliance with nCPAP treatment appears to be associated with the presence of subjective daytime sleepiness before nCPAP application. Long-term compliance with nCPAP may be mostly predicted from the usage pattern within the first three months of use.

  • PDF

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

Tracing the Development and Spread Patterns of OSS using the Method of Netnography - The Case of JavaScript Frameworks - (네트노그라피를 이용한 공개 소프트웨어의 개발 및 확산 패턴 분석에 관한 연구 - 자바스크립트 프레임워크 사례를 중심으로 -)

  • Kang, Heesuk;Yoon, Inhwan;Lee, Heesan
    • Management & Information Systems Review
    • /
    • v.36 no.3
    • /
    • pp.131-150
    • /
    • 2017
  • The purpose of this study is to observe the spread pattern of open source software (OSS) while establishing relations with surrounding actors during its operation period. In order to investigate the change pattern of participants in the OSS, we use a netnography on the basis of online data, which can trace the change patterns of the OSS depending on the passage of time. For this, the cases of three OSSs (e.g. jQuery, MooTools, and YUI), which are JavaScript frameworks, were compared, and the corresponding data were collected from the open application programming interface (API) of GitHub as well as blog and web searches. This research utilizes the translation process of the actor-network theory to categorize the stages of the change patterns on the OSS translation process. In the project commencement stage, we identified the type of three different OSS-related actors and defined associated relationships among them. The period, when a master commences a project at first, is refined through the course for the maintenance of source codes with persons concerned (i.e. project growth stage). Thereafter, the period when the users have gone through the observation and learning period by being exposed to promotion activities and codes usage respectively, and becoming to active participants, is regarded as the 'leap of participants' stage. Our results emphasize the importance of promotion processes in participants' selection of the OSS for participation and confirm the crowding-out effect that the rapid speed of OSS development retarded the emergence of participants.

  • PDF