• Title/Summary/Keyword: Mobile Apps

Search Result 366, Processing Time 0.023 seconds

Metaverse App Market and Leisure: Analysis on Oculus Apps (메타버스 앱 시장과 여가: 오큘러스 앱 분석)

  • Kim, Taekyung;Kim, Seongsu
    • Knowledge Management Research
    • /
    • v.23 no.2
    • /
    • pp.37-60
    • /
    • 2022
  • The growth of virtual reality games and the popularization of blockchain technology are bringing significant changes to the formation of the metaverse industry ecosystem. Especially, after Meta acquired Oculus, a VR device and application company, the growth of VR-based metaverse services is accelerating. In this study, the concept that supports leisure activities in the metaverse environment is explored realting to game-like features in VR apps, which differentiates traditional mobile apps based on a smart phone device. Using exploratory text mining methods and network analysis approches, 241 apps registed in the Oculus Quest 2 App Store were analyzed. Analysis results from a quasi-network show that a leisure concept is closely related to various genre features including a game and tourism. Additionally, the anlaysis results of G & F model indicate that the leisure concept is distictive in the view of gateway brokerage role. Those results were also confirmed in LDA topic modeling analysis.

Design MetaModel for MCF (Mobile Cross Framework) Based MDA (MDA기반 모바일 크로스 프레임워크를 위한 메타모델 설계)

  • Song, Yujin;Han, Deoksoo;Lee, Eunjoo
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.2
    • /
    • pp.292-298
    • /
    • 2019
  • Mobile-based software development methodology has been vigorously researched from using object-oriented development methodology and component-based development methodology previous structural developing methodology. There are two types of OS in mobile platform which are android and iOS. There is a problem that the application to be developed is developed depending on the device type. To resolve this problem, first, the system structure and design method should be managed effectively. Second, a basic design guide that can be commonly adapted to the each project is required. In this paper, we define a mobile cross platform meta model based on MDA-development methodology, focusing on reusability, portability and interoperability about non - dependent part of the mobile platform. If the proposed meta-model is applied to manage the related information and all the types of Mobile-Apps become available through independent mobile app development process, henceforward, it will be much of help establishing formulaic mobile-app developmental methodology.

Meeting Real Challenges in Eliciting Security Attributes for Mobile Application Development

  • Yusop, Noorrezam;Kamalrudin, Massila;Yusof, Mokhtar Mohd;Sidek, Safiah
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.25-32
    • /
    • 2016
  • There has been a rapid growth in the development of mobile application resulting from its wide usage for online transaction, data storage and exchange of information. However, an important issue that has been overlooked is the lack of emphasis on the security issues at the early stage of the development. In fact, security issues have been kept until the later stage of the implementation of mobile apps. Requirements engineers frequently ignore and incorrectly elicit security related requirements at the early stage of mobile application development. This scenario has led to the failure of developing secure and safe mobile application based on the needs of the users. As such, this paper intends to provide further understanding of the real challenges in extracting security attributes for mobile application faced by novice requirements engineers. For this purpose, two experiments on eliciting security attributes requirements of textual requirements scenario were conducted. The performance related to the correctness and time taken to elicit the security attributes were measured and recorded. It was found that the process of eliciting correct security attributes for mobile application requires effort, knowledge and skills. The findings indicate that an automated tool for correct elicitation security attributes requirement could help to overcome the challenges in eliciting security attributes requirements, especially among novice requirements engineers.

The Impact of Past Behavior on Intention to Smartphone Application Piracy (과거행동이 스마트폰 애플리케이션 불법복제 의도에 미치는 영향)

  • Kim, Joong Han
    • Journal of Service Research and Studies
    • /
    • v.6 no.2
    • /
    • pp.37-49
    • /
    • 2016
  • Due to the expandability of smartphone, the mobile application market is growing explosively. However, as happens in other digital contents markets, piracy of mobile applications is prevalent. This study investigated the effects of behavioral factors on smartphone application piracy. The research model consists of factors from the theory of planned behavior model - subjective norms, attitudes toward piracy and perceptions of behavioral control. In addition, perceived consequences, past behavior and habit was included. The past behavior of PC software piracy was a meaningful predictor of habit, and habit was found to influence significantly the smartphone piracy intention. The result also shows that perceived benefit had significant effect on attitude, but both perceived legal and technical risk were not significantly related to attitude. Implications for research and practice are discussed.

Usability Test to Improve the News Applications of the Major Broadcasting Companies :Focus on the MBC and SBS (지상파 방송사의 뉴스 앱 개선을 위한 사용성 평가 :MBC와 SBS를 중심으로)

  • Oh, Ryeong;Lim, Soon-Bum
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.10-22
    • /
    • 2021
  • This study conducted usability test to users in 20s in order to find problems for improving news apps of the major broadcasting companies. Efficiency, effectiveness, and satisfaction were evaluated by mobile news content type. Also there is including analysis of the news topics (hard news, soft news) and broadcasters (MBC, SBS). As a result, same problems were found in common items according to mobile news content types. And in the news topic, there was a difference in the news values and news attributes that need to be improved. This study gives practical implications to the news producers to improve the contents of news apps.

An analysis on the difference in banking app usability by elderly age - Focusing on the PACMAD model - (고령층 연령에 따른 뱅킹앱 사용성 인식에 대한 차이 분석 -PACMAD 모델을 중심으로-)

  • Hyun Suk Joung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.2
    • /
    • pp.61-75
    • /
    • 2023
  • This study aims to evaluate the usability of a banking app that is frequently used by the elderly. To this end, the usability PACMAD(People At the Center of Mobile Application Development) model that can be used in mobile was explained and the usability evaluation was empirically verified for the elderly over 60 years of age. For this study, descriptive statistics and variance analysis were conducted using SPSS 25.0 for 165 elderly people who had experience using banking apps. Looking at the analysis results of this study, efficiency, satisfaction, and effectiveness showed relatively high scores, and learnability, memorability, error, and cognitive load showed relatively low scores. In addition, in the verification of differences by age, it was confirmed that there were differences in all variables by age. These results suggest that the elderly's usability evaluation of banking apps and differences by age could be confirmed, but there is also a limitation that comparison with the general public is difficult because the age is limited to the elderly.

Memory Allocation and Reclamation Policies for Fast Swap Support in Mobile Systems (모바일 시스템의 고속 스왑 지원을 위한 메모리 할당 및 회수 기법)

  • Hyokyung Bahn
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.29-33
    • /
    • 2024
  • Recent advancements in mobile apps have led to continuously increasing memory demands on smartphone systems. Unlike desktops, which use swap functions to backup the entire memory footprint to storage when memory space is exhausted, smartphones terminate apps and lose significant context. This occurs because large-scale I/O operations to flash memory cause severe delays when swap is enabled on smartphones. This paper discusses how efficient memory management can be performed by using eMRAM, which is faster in write operations than flash memory, as the swap area in mobile systems. Considering the characteristics of backup storage (i.e., flash memory for the file system and eMRAM for the swap areas) as well as the reference characteristics of each page, we demonstrate that the proposed memory allocation and reclamation policies can improve the smartphone's I/O performance by an average of 15%.

An Illegally-copied App Detecting Method by Using Odex File in Android Platform (안드로이드 플랫폼에서 odex 파일을 이용한 불법 복제 앱 탐지 방법)

  • Cho, Dueckyoun;Choi, Jaeyoung;Kim, Eunhoe;Gang, Gi-Du
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.67-75
    • /
    • 2015
  • According to the changes of the mobile environments, the usage and interest of the Android apps have been increased. But the usage of illegally-copied apps has been also increased. And the transparency and dependability of the app markets has been decreased. Therefore there are many cases for the copyright infringement of app developers. Although several methods for preventing illegally-copied apps have been studied, there may exist possible ways to bypass the methods. Since it is difficult to find out the first distributors of the illegally-copied apps, it is not easy to punish them legally. This paper proposes the method of detecting illegally-copied apps. The proposed detector can detect the illegally-copied apps using odex file, which is created when the app is installed. The detector can also find out the information of the first distributors based on forensic watermark technique. Since the illegally-copied app detector is running as a service on the system server, it is granted that the detector hides from the users. As an experiment result, the illegally-copied app detector takes on average within 0.2 seconds to detect and delete an illegally-copied app.

Design and Effects of Science Simulation Applications Using Flash and ActionScript 3.0: In the Composition of Material Chapter in Middle School Science Textbooks (Flash와 Actionscript 3.0을 이용한 과학 시뮬레이션 앱의 디자인 및 효과 -중학교 과학 '물질의 구성' 단원을 중심으로-)

  • Lee, Chang Youn;Park, Chulkyu;Hong, Hun-Gi
    • Journal of The Korean Association For Science Education
    • /
    • v.38 no.4
    • /
    • pp.527-539
    • /
    • 2018
  • Although a simulation is proposed as a candidate for alternative contents of inquiry activities, design cases focused on the characteristic of science education are rare. This study suggested the definition and requirements of science simulation to clarify science subject-specific design and set up the design guidelines to consider usability. Then the science simulation was developed in the form of an app for mobile devices, where 'Flash and Actionscript 3.0' was selected as a development tool for compatibility, functionality, ease of use and optimization for mobile devices with educational applicability in mind. In effect, six science simulation apps were prepared for seven classes of inquiry activity in 10 science classes on the chapter of 'composition of material' in middle school science 2 textbooks. In this regard, the main advantages of the simulation apps expected from each design characteristic are also suggested in this article. In the implementation of the science simulation apps, educational effects were investigated based on the statistical comparison, while 134 students in the second grade in a coeducational middle school, Gyeonggi-do participated as an intervention group and a control group. Our results showed that the scores of academic achievement and affective test in the intervention group were significantly higher than those of the control group (p <.05). In the questionnaire survey on usability, most students responded positively to the design of the science simulation apps. This study will contribute to expanding the horizon of design about science simulation as a design case in science education.

Threats Analysis and Mobile Key Recovery for Internet of Things (IoT 환경에서의 보안위협 분석과 모바일 키 복구)

  • Lee, Yunjung;Park, Yongjoon;Kim, Chul Soo;Lee, Bongkyu
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.5
    • /
    • pp.918-923
    • /
    • 2016
  • IoT should be considered security risk environments such as various platforms and services including smart devices that can be mounted on household electric appliances, healthcare, car, and heterogeneous networks that are connected to the Internet, cloud services and mobile Apps.. In this paper, we provide analysis of new security threats, caused by open-platform of IoT and sensors via the Internet. Also, we present the key recovery mechanism that is applied to IoT. It results to have compatibility with given research, reduces network overhead, and performs key recovery without depending on key escrow agencies or authorized party.