• Title/Summary/Keyword: Personal Use

Search Result 2,705, Processing Time 0.029 seconds

A Study on Continuous Intention of Use of Heavy VR Game Users -Focusing on comparison with light users- (VR 게임 중이용자의 지속적 이용 의도에 관한 연구 -경이용자와 비교 중심으로-)

  • Na, Jiyoung
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.431-438
    • /
    • 2022
  • With the technical development of fourth industrial revolution, VR game market is rapidly expanding. Meanwhile, heavy user group means the group consisting of people consuming certain media or contents more than others, which is the core constituency of the media industry, and there have been only a few studies on them. This study identified the factors that influenced the continuous intention of use of VR game heavy users and figured out their characteristics by verifying the difference in variables with the light user group. According to the results, the heavy user group showed higher behaviors than the light user group in terms of personal innovation, presence, and continuous intention of use variables. In addition to this, it was found that personal innovation, perceived quality, and presence had a significant influence on the continuous intention of use. This study is intended to empirically analyze the characteristics of heavy VR game users and influential factors, thereby preparing baseline data for VR game development and other relevant studies.

A Study on Intention to Use Personal Cloud Services: Focusing on Value Comparison (개인용 클라우드 서비스 사용 의도 연구: 가치 비교를 중심으로)

  • Kyunghoi Min;Chanhee Kwak;HanByeol Stella Choi;Heeseok Lee
    • Information Systems Review
    • /
    • v.22 no.2
    • /
    • pp.1-24
    • /
    • 2020
  • Cloud computing technology is expanding its services to individual consumers through storage and applications. This study aims to compare the predisposing factors that affect the perceived value and the intention to use between users who have used or experienced services and those who have never experienced services from the perspective of benefit and sacrifice based on the value-based acceptance model. The results showed that the sacrifice factor (perceived cost) had a significant effect on perceived value and perceived value had a significant effect on intention to use, but showed a difference in perceived benefit. Perceived usefulness, ubiquity, and network effects had significant impact for experienced users' perceived value, but for inexperienced users, ubiquity did not have significant impact. In addition, usefulness was the most significant factor for experienced users while network effect was the same for inexperienced users. The results of this study suggest that consumers' intention to use personal cloud service is evaluated as a benefit and sacrifice point and a new attempt to re-examine the role of previous experience.

A Retrieval Technique of Personal Information in a Web Environment (웹 환경에서의 개인정보 검색기법)

  • Seo, Young-Duk;Chang, Jae-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.145-151
    • /
    • 2015
  • Since we use internet every day, the internet privacy has become important. We need to find out what kinds of personal information is exposed to the internet and to eliminate the exposed information. However, it is not efficient to search the personal information using only fragmentary clues in web search engines because the ranking results are not relevant to the exposure degree of personal information. In this paper, we introduced a personal information retrieval system and proposed a process to remove private data from the web easily. We also compared our proposed method with previous methods by evaluating the search performance.

A Study on the Factors Affecting the Establishment of Personal Information Management Systems (PIMS)

  • Seo, Young-Soo;Lee, Seong-Il;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.3
    • /
    • pp.31-47
    • /
    • 2012
  • As the dependence on information is increasing, the protection of personal information (PI) becomes a critical issue for the organizations, causing not only financial loss but also negative impacts on corporate images and reputations. To date, academic research in this area is scarce. This study analyzes the factors affecting the establishment and/or implementation of Personal Information Management System (PIMS) and provides direction for the practice. In this study, we assume that PIMS is one of the new technology adopted by organizations, and Unified Theory of Acceptance and Use of Technology (UTAUT) model is selected as a base model for the study. Using structural equation modeling technique, both measurement and structural models are validated, and hypotheses are tested. Major findings of the study include (1) the major driver of the organizations attempting to adopt PIMS seems to be the improvement of the business outcomes, (2) organizational capability and resource are important in the establishment of PIMS, and (3) the perceived difficulty of the establishment of PIMS is not affecting the intention to adopt PIMS. Since the importance of personal information security is high, establishment of PIMS is becoming one of the critical issues in the organizations. The establishment of PIMS should be encouraged to strengthen the competitiveness of businesses and to enhance the security level of the entire nation. It is expected that this study may contribute to developing plans and policies for establishment of PIMS in practice, and to providing a foundation for further research in this area.

Analysis of Privacy Vulnerability Caused by Location-Based Service (위치기반 서비스에 따른 개인정보보안 취약점의 사례분석)

  • Choi, Hee Sik;Cho, Yang Hyun;Kim, Jung Sook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.151-159
    • /
    • 2014
  • Recently, spread of large amount Smartphones made users to download location-based service applications, which provided by application developers. These location-based service applications are convenient tool for users. Location-based service use technology to find location of user and provide information of user's location. Leakage of information of user's location and expose of privacy life raised new controversy. In this thesis, it will analyze relations of increase of Smartphone market, usage of Location-based service and severity of personal information leakage. Also, it will analyze examples of user's case of damage which caused by leakage personal information and find solutions to reduce damage of personal information leakage. In research, it will find cases of damage that cause by Location-based service. Also it will analyze and research cases of damage and present with graph and chart. In conclusion, to reduce and prevent from damage which caused by leakage personal information, it is important that users and application developers to realize danger of private and personal information leakage. Also, user's personal information must deal with cautiously and application developers have to research and develop the application with powerful security.

Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments (퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가)

  • Jin, Byungwook;Kim, Jonghwa;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

Effects of Human Activity Patterns on Personal Exposure Levels of Nitrogen Dioxide in A-San Area (아산지역에 있어서의 $NO_{2}$ 개인 피폭량에 미치는 각종 생활행동 패턴의 영향)

  • 손부순;김대선;정문식
    • Journal of environmental and Sanitary engineering
    • /
    • v.11 no.3
    • /
    • pp.47-52
    • /
    • 1996
  • Personal exposure levels of $NO_{2}$ for office workers and housewives Living in A-San and neighboring prefectures were measured in two seasons with $NO_{2}$ filter badge. $NO_{2}$ concentrations in indoor and outdoor air in their offices and houses were also measured in the same periods. Personal exposure levels in winter ranged from 13 to 132 ppb and its distribution pattern was remarkably different from the other seasons (15.2-17.9 ppb). This fact suggests that use of heating apparatus affects largely $NO_{2}$ indoor air pollution in winter seasons. Actually, $NO_{2}$ exposure levels of subjects used Kerosene heater (43.6ppb) and gas heater (33.4ppb) were higher than those of subjects unused heating apparatus (18.0ppb). Personal exposure levels of $NO_{2}$ for man and woman Living in the same houses were correlated well each other. The time spent indoors for office workers and housewives were both longer than 22 hour a day. Home staying time was about 60% of total indoor staying time for office workers and 90% or more for housewives. Personal exposure levels were significantly related to indoor exposure levels at home all seasons. Furthermore, personal exposure levels could be estimated from $NO_{2}$ concentrations and staying times in various Living environment.

  • PDF

Construction of the Personal 3D Characters for Virtual Clothing Coordination (가상 의복 코디네이션을 위한 개인 3D캐릭터의 구성)

  • 최창석;김효숙
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.27 no.9_10
    • /
    • pp.1015-1025
    • /
    • 2003
  • This paper proposes a method for constructing the virtual characters adopting the personal body types for the clothing coordination. At first, the method produces the 38 kinds of the Korean 3D body models considering sex, ages and body types, and constructs model DB. We select a model similar to the personal body size from DB and deform the selected model according to body size. The method deforms the model linearly for height 12 items, width 6 items, depth 5 items and round 13 items, and constructs the personal character fitted to the personal body size. The preprocess for model deformation consists of grouping for body part and establishing the feature points. Linear deformation for each group leads us to easy construction of the virtual personal characters. This method has two advantages as follows: 1. Large reduction of man power, cost and time for DB construction of the body 3D models, since the preprocess permits us to effectively use the various body models whose geometrical structures are different, 2 Suitability to Web-based clothing coordination, since the body deformation method is simple and its speed is very high.

A Case study f i-PIN Service for Information Security (보안성 강화를 위한 i-PIN 서비스 적용 사례 연구)

  • Kim, Hyunjoo;Lee, Soojong
    • Journal of Software Engineering Society
    • /
    • v.25 no.1
    • /
    • pp.19-28
    • /
    • 2012
  • Personal registration number has been used as a means of personal identification on existing internet. However, its use on internet sites has become a major factor increasing danger of leaking of personal information. Presently, the government recommends i-PIN to minimize the collection of personal registration numbers and leaking of personal information on internet. Original purpose of i-PIN is to recognize persons by its virtual number of 13 digits instead of using personal registration number on internet websites. These days, i-PIN continues to be used increasingly as a form of certification. This study seeks to explore software service methodology of using i-PIN as a form of certification on internet websites and examples in which its other forms of self certification are used than existing i-PIN services.

  • PDF

Development of Personal Mobility Safety Assistants using Object Detection based on Deep Learning (딥러닝 기반 객체 인식을 활용한 퍼스널 모빌리티 안전 보조 시스템 개발)

  • Kwak, Hyeon-Seo;Kim, Min-Young;Jeon, Ji-Yong;Jeong, Eun-Hye;Kim, Ju-Yeop;Hyeon, So-Dam;Jeong, Jin-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.486-489
    • /
    • 2021
  • Recently, the demand for the use of personal mobility vehicles, such as an electric kickboard, is increasing explosively because of its high portability and usability. However, the number of traffic accidents caused by personal mobility vehicles has also increased rapidly in recent years. To address the issues regarding the driver's safety, we propose a novel approach that can monitor context information around personal mobility vehicles using deep learning-based object detection and smartphone captured videos. In the proposed framework, a smartphone is attached to a personal mobility device and a front or rear view is recorded to detect an approaching object that may affect the driver's safety. Through the detection results using YOLOv5 model, we report the preliminary results and validated the feasibility of the proposed approach.