• Title/Summary/Keyword: Mobile Check-in

Search Result 334, Processing Time 0.029 seconds

The Influence of Personality Traits on Airline Untact Check-in: Focusing on Mobile Check-in User

  • YANG, Jae-Pil;PARK, Sang-Beom
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.1
    • /
    • pp.15-30
    • /
    • 2021
  • Purpose: Year of 2020, COVID-19 has been changing the people's everyday life to ways never been thought of before all over the world. The IT and electronic industry, the methods of supplying goods and services have been changed from contact to un-tact environments based on un-tact systems very rapidly. COVID-19 has been striking the tourism and the travel industry, especially the airline and hotel industry of which services are provided by human. For the passenger service of airliner, automation has been propelled and un-tact style of service has become mainstreams except cabin service since 2000's. For passenger transportation, due to traffic regulations and exclusions etc., switching to new ways is not easy. However, under the new environment made by COVID-19, kiosk check-in, web check-in and mobile check-in has become more important. In this study, the characteristics of airline customers using mobile goods are investigated to find ways to raise the rate of utilizing mobile check-in and to increase the efficiency of boarding process. Research design, data, and methodology: Considering the COVID-19 environment, survey was done by online research company. The research model is designed to integrate the user characteristics and usage/purchase motive and technology acceptance theory. Especially considering infectious diseases prevention, concern of safety is adopted as one of the usage motive variable. Results: Extraversion or conscientiousness characteristics prefers counter check-in(contact service), while openness characteristics prefers mobile check-in(un-tact service). Concern of safety for infectious disease shows strong non-preference on counter check-in. Conclusions: Regarding service type regardless of type of the industry, automation and un-tact have been mainstreams due to high costs of labor, efficiency and standardization issue, etc., and COVID-19 has given impetus to them. For airliner, un-tact service including boarding process service has been more and more important. To raise the rate of un-tact service use, the characteristics of the user should be analyzed first. The study results indicate that for extraversion or conscientiousness, some kinds of methods to induce them to use un-tact service more are needed.

An Audit Model for Customer Relationship Management in Smart Mobile Environments (스마트 모바일 환경에서 고객관계관리 구축을 위한 감리 모형)

  • Chung, Woong;Kim, Dong Soo;Rhee, Hye Kyung;Kim, Hee Wan
    • Journal of Digital Convergence
    • /
    • v.11 no.5
    • /
    • pp.187-199
    • /
    • 2013
  • Since the supply of smart phones, a change in mobile environment brought a turning point called a mobile generation. Smart mobile office is a combined form of smart phones' new mobile environment and its social media. A construction of mobile office environment using smart phones brought revitalization of the smart phone market. CRM construction also became new requirements for a customer management. However, based on the current information system audit standard, check fields or check lists are insufficient to apply to audit for CRM construction in a smart mobile office environment. Therefore, this paper proposes a model for auditing CRM system construction in smart mobile office environment. It proposes audit domain and check lists of CRM construction. It also verified whether the proposed model is suitable or not by doing a survey if deduced audit domain and check lists correspond with the purpose of the CRM construction audit during smart mobile office environment. As the result, this study appear to have more than average satisfaction the suitability results were.

A Study on the Security Checklist Improvements to improve the Security in the Mobile Applications Development (모바일 어플리케이션 개발에서의 보안성 향상을 위한 보안 점검항목 개선에 관한 연구)

  • Shin, Jun-Yuop;Kim, Dong-Soo;Han, Ki-Jun;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.113-127
    • /
    • 2014
  • The use of mobile devices offers a variety of services to the individuals and companies. On the other hand, security threats and new mobile security threats that exist in IT infrastructure to build the environment for mobile services are present at the same time. Services such as mobile and vaccine management services, such as MDM (Mobile Device Management) has attracted a great deal of interest in order to minimize the threat of security in mobile environment. These solutions can not protect an application that was developed for the mobile service from the threat of vulnerability of mobile application itself. Under these circumstances, in this paper, we proposed mobile application security checklists based on application security review items in order to prevent security accidents that can occur in a mobile service environment. We collected and analyzed Android applications, we performed a total inspection of the applications for verification of the effectiveness of the check items. And we checked that the check items through a survey of experts suitability was verified.

A Study on the Vulnerability of Using Intermediate Language in Android: Bypassing Security Check Point in Android-Based Banking Applications (안드로이드 뱅킹 어플리케이션 내 중간언어 분석을 통한 보안 검사 지점 우회 취약점 연구)

  • Lee, Woojin;Lee, Kyungho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.549-562
    • /
    • 2017
  • In recent years, as the proportion of mobile banking has become bigger with daily usage of mobile banking, security threats are also increasing according to the feeling. Accordingly, the domestic banking system introduces security solution programs in the banking application and sets security check points to ensure the stability of the application in order to check whether it is always executed. This study presents a vulnerability of inactivity bypassing mobile vaccine program operation checkpoints using the intermediate language statically and dynamically analysis when decompiling the android banking applications of major banks in Korea. Also, through the results, it identifies possible attacks that can be exploited and suggest countermeasures.

Development of Smartphone Application for Monitoring Container Cargo (컨테이너화물 모니터링을 위한 스마트폰 애플리케이션 개발)

  • Choi, Hyung-Rim;Son, Hee-Mok
    • Journal of Information Technology Services
    • /
    • v.13 no.1
    • /
    • pp.209-220
    • /
    • 2014
  • Most of monitoring systems in logistics industry have limitations on monitoring container information in real-time. And customers only could check information gathered from certain points through web browser. That is why it is very hard to take actions in advance when emergency situation has happened. But if customers could check information such as position and status of freight in real-time through their mobile devices, they could take prompt actions. So, in this study, mobile application based on mobile devices is developed to monitor position and status information of the container in real-time. Entire devices monitoring container in aspect of logistics security are handled by workers in the field. So it is strongly required to develop monitoring system operated in mobile devices. For that reason this study aims to develop mobile application in order to monitor information related to container security and safety in real-time.

What is the Switching Intention from Existing Payment to Mobile Payment Service?

  • Lee, Sae-Bom;Lee, Joon-Young;Moon, Jae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.6
    • /
    • pp.59-66
    • /
    • 2018
  • Recently, the use of mobile payment, called "Pay" payment, is increasing such as 'KakaoPay' and 'SamsungPay'. In Korea, various mobile payment services are running and emerging. The purpose of this study is to examine the intention to switch from using existing credit cards or check card to mobile payment service based on the two-factor theory. We empirically examined the effect of the two factors, the factors that enable switching and the factors that inhibit switching. Therefore, the study use switching cost and switching benefit as parameters to confirm the effect on the switching intention. In addition, this study intends to analyze the differences between two subgroups by the degree of personal innovativeness. We survey smartphone users and credit card or check card users, and analyzed the Smart PLS 3.0 using structural equation model to verify the significance of the research hypothesis.

A Case Study of a Mobile Hospital Information System Usability (모바일 병원정보시스템 사용성에 대한 실증연구)

  • Ahn, Myong-Jin;Yang, Joon-Young;Ryu, Hyo-Seon;Park, Chan-Seok
    • Korea Journal of Hospital Management
    • /
    • v.18 no.4
    • /
    • pp.97-112
    • /
    • 2013
  • This study is a proposal of quality scale and measurement for the Mobile Hospital Information System Usability used to the Chungnam National University Hospital in Daejeon Korea. This study is to provide decision- making guideline for hospital managers and to provide feedback for the users' information needs in Mobile Hospital Information System. The target people of the study were medical doctors in Chungnam National University Hospital. The service contexts of usability were request of medical Care, Vital sign check of Patient, Care Agreement of Patient, Blood management, Check of care state, Sign of choice doctors, Query of doctor order and patient measurement result. The Usability factors were the efficiency, effectiveness and satisfaction of quality model ISO9241-11. This study shows that the Mobile HIS is used for the communication and education between doctor and patients. Especially, The Care Agreement of Patient is a part of the most utilized in the Mobile HIS.

  • PDF

Development ofn Sharing Space Access Management System based on Mobile Key and RCU(Room Control Unit) (모바일 키 및 RCU에 기반한 공유공간 출입관리 시스템 개발)

  • Jung, Sang-Joong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.4
    • /
    • pp.202-208
    • /
    • 2020
  • Recently, the importance of non-face-to-face has been emphasized due to COVID-19, and the use of sharing spaces is also expanding. The use of uncontact check-in technology for access control of sharing spaces reduces waiting time and optimizes workers' efficiency, resulting in operational cost savings. In this paper, we propose a sharing space access management system based on a mobile key and RCU (Room Control Unit), access to the facility using a mobile key, and monitor the facility using an RCU. Proposal system is for shared accommodation, rental field (residence, sale-selling hotel), shared office, etc. when there is a one-time visitor on a specific day and time, the corresponding password is delivered to the mobile platform to expose and key the existing password. It is supported by a field-adaptive system that can reduce discomfort such as delivery. In order to test the operation of the proposed integrated system, tests were conducted according to scenarios to understand the overall status of the user's reservation, check-in, and check-out, and a 100% success rate was derived for each item by setting performance indicators to prove test reliability.

Network Defense Mechanism Based on Isolated Networks (격리 네트워크를 활용한 네트워크 방어 기법)

  • Jung, Yongbum;Park, Minho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1103-1107
    • /
    • 2016
  • Network assets have been protected from malware infection by checking the integrity of mobile devices through network access control systems, vaccines, or mobile device management. However, most of existing systems apply a uniform security policy to all users, and allow even infected mobile devices to log into the network inside for completion of the integrity checking, which makes it possible that the infected devices behave maliciously inside the network. Therefore, this paper proposes a network defense mechanism based on isolated networks. In the proposed mechanism, every mobile device go through the integrity check system implemented in an isolated network, and can get the network access only if it has been validated successfully.

Implementation of U-Healthcare System for Chronic Disease Management (만성 질환자 관리를 위한 U-Healthcare 시스템 구현)

  • Ryu, Geun-Teak;Choi, Hun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.1
    • /
    • pp.233-240
    • /
    • 2014
  • According to the recent increasing trend of the ages, numbers of patients with chronic diseases are increasing and issues for health care are importantly emerged. In this thesis the research implements U-health care system for health care of patients with chronic diseases. The suggested system for health care of patients with chronic diseases composes bio measurement system, mobile gateway and medical information management server, and bio-signals are composed with modules such as electrocardiogram, blood pressure, blood sugar, oxygen saturation if configured as client. Blood sugar check was considered and implemented to be chosen the ways to transmit through bio measurement system or through gateway. Suggested bio measurement system and mobile gateway are transmitted through Bluetooth. The transmitted biodata is searched by observing health check through mobile gateway, by transmitting through network server, and by using client. By implementing bio signal observation system of patients with chronic diseases, present health check is available by monitoring measured bio data, and various bio signals are transmitted in the mobile environment.