• Title/Summary/Keyword: Mobile Policy

Search Result 996, Processing Time 0.026 seconds

Application of TAM and QFD for analyzing the user requirement in u-Healthcare System - Focused on fitness service (u-헬스케어 시스템에서 사용자 요구사항을 분석하기 위한 TAM과 QFD의 적용 - u-휘트니스 서비스 중심)

  • Kim, Min-Cheol
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.191-196
    • /
    • 2012
  • The importance of hi-tech communications technology including mobile or ubiquitous system and the related business field is currently expanding. In terms of wellness for enhancing quality of individual life, ICT technology became a requirement, not an option. The first purpose of this study is to identify factors that influence user's perceived usefulness & perceived ease of use related to the acceptance of TAM focused on ubiquitous fitness service through multiple regression analysis, thereby discovering important factors influencing consumer behavior. In conjunction with the result, the second purpose of this study has also its implication on the u-Healthcare system development using QFD. That is, this research is to propose the possibility of combining the external variables of TAM to u-Healthcare system service characteristics with user requirement reflected by using QFD method. Based on these results, the suitable system may be constructed and developed.

Study on Human Motion based Smartphone UX Pattern using User Experience Design (사용자 경험 디자인을 이용한 인간 동작 기반 스마트폰 UX 패턴 연구)

  • Joo, Jeong-Gyu;Lee, Jun-Hwan;Cho, Han-Jin
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.345-350
    • /
    • 2012
  • People established a network much more using smart equipments by means of the development of the mobile industry. They can get useful information easily, make new personal connections and communities, and form various personal connections using the communities. The importance of contact, timing, and utility of time plays an important role in human relations. Many programs related to personal relations are already saturated. In other words, they are very significant and difficult to use. Many programs that didn't be concerned ahead of time about how to deal with a lot of the amount of information effectively and take it out in order to use it could bring about negative results. Human being already makes use of physical-empirical language in all of the conscious and unconscious areas. This study begins at the supposition that how to make it easy to apply humane gestures and languages to applications with portable equipment close to human beings.

Study on Simultaneous Analysis and Use of Preservatives in Mouthwashes (구강 청정제 중 보존제의 동시 분석법 확립과 사용실태에 관한 연구)

  • Jung, Sang-Mi;Moon, Tae-Jung;Kim, Jae-Dong;Lee, Gye-Won
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.331-339
    • /
    • 2012
  • The easy and simple simultaneous analytical method of preservatives (BA, SA, DHA, MP, EP, IPP, PP, IBP and BP) was studied by more easily changing from method used in food and drug using HPLC with scherzo SM-C18 column. All presevatives were seperated successfully in mobile phase of 50 mM ammonium formate : 0.1% phosphoric acid (50:50 v/v%) and 50 mM ammonium formate : acetonitrile (30 : 70). Retention time of BA, SA, DHA, MP, EP, IPP, PP, IBP and BP was 7.74, 9.08, 12.57, 13.83, 21.62, 27.29, 28.20, 33.20 and 33.68 min, respectively. The calibration curves of BA, SA, DHA, MP, EP, IPP, PP, IBP and BP were linear over the concentration range of 5~80 ${\mu}g/mL$ with correlation coefficient of above 0.999. The limit of detection (LOD) and limit of quantitation (LOQ) of BA, SA, DHA, MP, EP, IPP, PP, IBP and BP were 0.52 and 1.58, 1.09 and 3.29, 1.00 and 3.03, 1.36 and 4.13, 1.26 and 3.83, 1.02 and 3.08, 1.11 and 3.37, 0.82 and 2.48, 0.85 and 2.59 ${\mu}g/mL$, respectively. The coefficients of variation for intra- and inter-day assay were 0.12~2.68 and 0.18~2.66%, respectively. The developed method showed good intra- and inter-day precision and accuracy. The preservatives used in mouthwashes were BA, MP and PP and were detected in 24 samples(86%) except for 4 samples and not showed significant difference in using dose of adult and children. In conclusion, the developed method can be useful for simultaneous analysis of preservatives in mouthwashes and these results suggest that could be applied to fundamental study and guideline on content of preservatives in mouthwashes.

Digilog Book Interaction Design Using Augmented Reality(AR) (Focused on Children's Books) (증강현실(AR)을 활용한 디지로그 북 인터랙션디자인 연구 (아동 서적물 중심으로))

  • Jung, Yong-Won;Ju, Min-Kyung;Kim, Yong-Ho
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.425-433
    • /
    • 2020
  • Digilog book using augmented reality is a form that augmented reality is implemented by illuminating the camera embedded in the mobile image on the page registered as an image marker after downloading the application, which shows a fragmentary limitation in the content implementation method. Therefore, in this study, we proposed a pop-up multi-tracking method that enables two-way interaction in a digit log book using augmented reality technology. Through this, we commissioned an authorized agency to test the technical differentiation of augmented reality content for two prototypes of existing book-type Digilog Book and Pop-up-type Digilog Book. A test report was issued. The pop-up type digit log book suggested in this study enables the user to implement the interactive contents according to the user's action (movement). This can induce the interaction between the virtual image and the printed picture book and give the learner an interest and immersion, so that it is possible to express the interaction of the digital log book.

A Study on the Determinant Process of Dominant Design of Smartphone Operating Systems (스마트폰 운영체제의 지배적 디자인 결정과정에 관한 연구)

  • Lee, Sang-Hyun;Park, Chul-Ju
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.127-139
    • /
    • 2014
  • The purpose of this research is to present the major factors which determine dominant design of Smartphone OS and to verify a logical causal relationship with them and user satisfaction. To achieve this goal, OS compatibility, OS enhancement, Installed base, and network effect were presented as determinants of Smartphone OS which serves as the basis for determining dominant design and their logical causal relationship with user satisfaction was empirically analyzed. The results of the research showed that OS compatibility and OS enhancements had a positive effect on the expansion of user base. Of the two factors, OS enhancement showed that it does not only expand the user base but also acts as the cause for the fortification of the network effect. Furthermore, it was shown that OS enhancement had a direct positive effect on user satisfaction. The findings of this research are significant in its academic contribution as well as its potential for practical application by presenting the logical causal relationship in the process of determining OS dominant design an area which was previously untouched by empirical testing.

An Audit Model for Information Protection in Smartwork (스마트워크 기반의 정보보호 감리 모형)

  • Han, Ki-Joon;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.229-239
    • /
    • 2014
  • Smartwork technology, using teleworking, smartwork centers and mobile terminal, provides a flexible work environments without constraints of time and space. Smartwork system to increase the work efficiency has the information protection threats according to their convenience. Thus, in order to build smartwork, it is proper to provide information protection audit to help ensure the information protection. In this paper, we have proposed an infortaion protection audit model at the practical and technical level for building a smartwork environment. We were classified as a terminal, network and server area for information protection, and derived a professional information protection check items. Further, by establishing a smartwork information protection audit time to map ISMS control items, we have proposed an audit model so that it is possible to improve the security and efficiency. It also verified whether the proposed model is suitable or not by doing a survey if deduced audit domain and check items correspond with the purpose of the smartwork information protection audit to auditors and IT specialists. As the result, this study was 97% satisfaction out of 13 check items.

A Study of Self-Checklist for Personal Information Protection of FinTech Service: For the Simple Payment Service (핀테크 서비스의 개인정보보호 자가평가항목 개발에 관한 연구: 간편결제 서비스 중심)

  • Kang, Min Soo;Back, Seung Jo;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.77-102
    • /
    • 2015
  • FinTech service industry has been growing rapidly around the world. It has driven innovation in financial and payment service industry with different channels such as mobile based on Information and Communications Technology (ICT). However, FinTech service is vulnerable to different security threats due to use the valuable data such as personal information and financial information. It is undeniable that collection and use of those information may increase the possibility of identity theft or privacy breach. In this paper will develop a self-checklist for the Simple Payment service users (Privacy Pragmatists) who want to make a rational decision to protect their personal information. The checklist is going to let the users assess the personal information protection by performing the assessment themself when they use the service. The body of this paper is going to analyze the items of the checklist and through the analysis, will suggest a security policy for personal information protection of FinTech service.

The Security Life Cycler Energy Service Platform for Universal Middleware (유니버설미들웨어기반 생명주기 보안에너지 서비스플랫폼 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1197-1202
    • /
    • 2017
  • Security services that support electric energy service gateway require relatively high reliability. In particular, the application services that accompany communications and data are run organically. Each of the security services should support a secure service platform that supports a secure, scalable life cycle for existing services which should be extends security layer of Universal Middleware. In this convergence platform, it is the study of security transfer modular services that allow independent life cycle management of systems through Universal middleware. First, It is modular in terms of energy consumption service and data, enabling real-time operation, communications, remote management and applications. Second, the life cycle of the secure module to support start, stop and updating of the security module by applying the security policy module layer concept. It is modular system enabling to design of dyanmic models in the smart grid, the service was intended to be standardized and applied to the security service platform.

A Review of Research on the Study Trends on Smart Work (스마트워크 연구경향분석)

  • Im, Kwang-Hyun;Lee, Dongjin;Kim, Jinhyuk
    • Informatization Policy
    • /
    • v.17 no.4
    • /
    • pp.3-22
    • /
    • 2010
  • The purpose of this study is to provide the fruitful directions for the future studies on smart work by analyzing the past and present trends that are related to smart work. For this, a wide range of materials and MA and PhD treatises produced from 1992 to the present have been collected and have been analyzed on the basis of various standards, including objective of study, approach method, methodology, method of data collection, statistical technique of analysis, summary of problems and alternativesto overcome limitations. Lessons and implications of this study for the possibility of smart work are presented. I hope this study will contributeto future studies concerned about smart work.

  • PDF

Energy-Aware Scheduling Technique to Exploit Operational Characteristic of Embedded Applications (임베디드 응용프로그램의 동작 특성을 이용한 에너지 인식 스케쥴링 기법)

  • Han, Chang-Hycok;Yoo, Joon-Hyuk
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.1
    • /
    • pp.1-8
    • /
    • 2011
  • Efficient power management plays a crucial role to strengthen competitiveness in the market of portable mobile commodities. This paper presents a proactive power management technique, called by Energy-Aware Scheduling policY (EASY), to exploit the sleep time information of running applications. Different from previous power management approaches focusing on power conservation in standby mode, the proposed scheme characterizes each application program's operational characteristic in active mode by observing how long the task stays in sleep state of CPU scheduler. Based on the measured sleep time, the proposed EASY speculates an adequate CPU clock frequency according to the current CPU workload and scales the frequency directly to the predicted one. Experimental results show that the proposed scheme reduces the power consumption by 10-30% on average compared to traditional DPM approach, with a minimal impact on the performance overhead.