• Title/Summary/Keyword: USER MANAGEMENT

Search Result 6,229, Processing Time 0.036 seconds

Effects of Consumer Trust and Perceived Usefulness on Mobile Payments and Online Shopping Website Loyalty (간편결제 서비스에 대한 지각된 유용성 및 신뢰가 결제 및 쇼핑몰 충성도에 미치는 영향)

  • Han, Jin-Hee;Jae, So-Hyun;Kim, Bo-Hyun;Park, Jee-Sun
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.75-87
    • /
    • 2015
  • The current study examines whether consumers' perceived usefulness of and trust in the integrated mobile payments services positively influence consumer loyalty to the payments system as well as to the online shopping websites where they have used the payments system. Moreover, the study investigates the effects of individual characteristics and brand awareness of the provider of mobile payments on perceived usefulness and trust. Online survey was administered to consumers ranging in age from 20s to 40s. Data analysis reveals that as consumers' perceived usefulness of and trust in the mobile payments system positively influence consumer loyalty to mobile payments and shopping mall websites. The results of the study suggests that e-commerce's user interface design, particularly the transaction system, should receive greater attention as a basic web element of e-commerce building rather than a set of plug-ins or so.

Vistors′ Activities and Hiking Patterns in Bukhan Moun-tain and National Park, Korea (북한산 국립공원의 이용행태특성 및 등산패턴)

  • 이명우;김용식;권영선
    • Korean Journal of Environment and Ecology
    • /
    • v.1 no.1
    • /
    • pp.66-82
    • /
    • 1987
  • The user's composition of socia-economic characteristics in Bukhan Mountain National Park showed that male. twenties and students were 65.4 percent. 62.7 percent and 37.4 percent respectively by sex, age and occupation. In visiting purpose, the nature-oriented motive was 67.1 percent of the total. hut the picnic patterns as of neighbourhood park and the recreation patterns as of recreation ground were appeared simultaneously. In preferable place of visitors. the well-known mountain hut, camp sites and summits were prefered. The level of scenic satisfaction was 7.8 and comparatively high on considering the maximum level of 10.0. The level of total satisfaction. however, was no more than 6.3 owing to lack of accomodation facilities along trails, 63.4 percent of visitors were opposed to construction cable-car and visitors were anxious seriously about the nature deterioration. In Jeongnung valley, the number of users was the lagest, so that the maximum number of passangers a day attained to 20.000. The peak seasons of visiting were Spring and Fall, and the peak hours during a day was 10-11 hours A.M. and 3-5 hours P.M. Therefore partitioned spatial management in consideration of hiking pattern of nature park. picnic pattern as of neighbourhood park and recreation pattern as of recreation ground shall be necessary to solve the conflicts among functions.

  • PDF

The Effect of Online Community, Members, and Personal Characteristics on Lurking Behavior: Why do people only consume rather than create contents? (온라인 커뮤니티 특성, 커뮤니티 멤버 특성, 개인 특성이 잠복관찰 활동에 미치는 영향:왜 사람들은 쓰지 않고 읽기만 하는가?)

  • Park, Do-Hyung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.73-88
    • /
    • 2014
  • Online communities are getting more popular with the development of information technology. It is essential that community members participate actively and share their contents or opinions continuously for the success and growth of online communities. However, it is revealed that most of members just take the role of passive observer. They are lurking community information and contents without any contribution. In this sense, this study focuses on explore lurking behavior of online community members. This study investigates the effect of the characteristics of online community, community members, and personal traits on user's lurking intention. Member familiarity and community identity have a strong positive effect on de-lurking intention, while the perception of usefulness and ease of use for communities and member expertise have a negative effect on de-lurking intention. Interestingly, users with a low level of self-esteem have higher level of motivation of participation than those with a high level of self-esteem. Finally, this study proposes several strategies to enhance information and contents sharing in online communities.

Comparative analysis on Social Network Service users access : Based on Twitter, Facebook, KakaoStory (소셜네트워크서비스 사용자 접속요인 비교분석 : 트위터, 페이스북, 카카오스토리를 중심으로)

  • Hong, Sam-Yull;Oh, Jae-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.9-16
    • /
    • 2012
  • Social Network Service (SNS) such as Twitter and Facebook has explosively grown nationwide since iPhone was introduced to Korea in 2009. In addition, KakaoStory has recently opened and joined to the SNS market, and it has grown to one of the most popular SNS in the domestic market in a short period of time. Social Network Service supports not only the formation of relationship between SNS users in common interests but also various activities such as management of personal connections and the sharing of information or contents. These three types of SNS have several common functions of sharing and distributing various contents rooted on the personal relationship formed through SNS. As each SNS user has specific reasons for the use of each service, a survey was conducted targeting those who use all of Twitter, Facebook, and KakaoStory was drawn by the statistical analyses of survey answers on users' reasons for each service. This result of study suggests factors to consider in order to exploit a new SNS or to enhance an existing service and can be used as a standard of which SNS for users to select for their own different purposes. It will also provide the basic data for the trust formation, one of the ethics in the upcoming Social Era.

A Design and Development of Big Data Indexing and Search System using Lucene (루씬을 이용한 빅데이터 인덱싱 및 검색시스템의 설계 및 구현)

  • Kim, DongMin;Choi, JinWoo;Woo, ChongWoo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.107-115
    • /
    • 2014
  • Recently, increased use of the internet resulted in generation of large and diverse types of data due to increased use of social media, expansion of a convergence of among industries, use of the various smart device. We are facing difficulties to manage and analyze the data using previous data processing techniques since the volume of the data is huge, form of the data varies and evolves rapidly. In other words, we need to study a new approach to solve such problems. Many approaches are being studied on this issue, and we are describing an effective design and development to build indexing engine of big data platform. Our goal is to build a system that could effectively manage for huge data set which exceeds previous data processing range, and that could reduce data analysis time. We used large SNMP log data for an experiment, and tried to reduce data analysis time through the fast indexing and searching approach. Also, we expect our approach could help analyzing the user data through visualization of the analyzed data expression.

Determination of Risk Ranking of Combination of Potentially Hazardous Foods and Foodborne Pathogens Using a Risk Ranger (Risk Ranger를 활용한 잠재적 위해식품과 미생물 조합에 대한 위해순위 결정)

  • Min, Kyung-Jin;Hwang, In-Gyun;Lee, Soon-Ho;Cho, Joon-Il;Yoon, Ki-Sun
    • Journal of Food Hygiene and Safety
    • /
    • v.26 no.2
    • /
    • pp.91-99
    • /
    • 2011
  • Risk ranking must be determined for various hazards/food combinations to conduct microbial risk management effectively. Risk Ranger is a simple, easy-to-use calculation tool developed in Microsoft Excel and designed to rank the risk (low, medium, and high) for semi-quantitative microbial risk assessment. The user is required to answer 11 questions in Risk Ranger related to 1) severity of the hazard, 2) likelihood of a disease-causing dose of the hazard being present in the meal, and 3) the probability of exposure to the hazard in a defined time. This study determined the risk ranking for twenty three combinations of foodborne pathogens/potentially hazardous foods (PHFs) using a Risk Ranger. In this study, pathogenic E. coli in fresh cut produce salad was scored as 79, which was the highest rank among the 23 combinations of the foodborne pathogens and PHFs. On the other hand, zero risk was obtained with V parahaemolyticus in sushi, Salmonella in meat products and E. coli O157:H7 in hamburger patties. Although Risk Ranger is very simple method to rate the risk of foodborne pathogens and PHFs combination, the accuracy of result was mainly affected by the availability and accuracy of data in the literature. According to the result of literature review, the data are needed for contamination rate of raw materials, consumption amount/frequency of PHFs, and the effect of processing on pathogen. Risk ranking must be continuously revalidated with new data.

Analysis of Living Lab Cases in R&D Initiatives for Solving Societal Problems and Challenges (사회문제 해결형 기술개발사업에서의 리빙랩 적용 사례 분석)

  • Seong, Ji Eun;Han, Kyu Young;Jeong, Seo Hwa
    • Journal of Science and Technology Studies
    • /
    • v.18 no.1
    • /
    • pp.177-217
    • /
    • 2018
  • This study examines the case of living lab applied in the R&D initiatives for solving societal problems and challenges. It discusses how to use the living lab in national R&D projects. The analyzed cases are 'Develop portable fundus camera for eye disease screening test to resolve health inequalities' and 'Auto-sensing integrated system development in rural pedestrian crosswalk'. As a result of the analysis, both cases were designed as a user participatory R&D structure by utilizing living lab. In other words, living lab has operated as a system that evolves technology-products-services into an infrastructure. It can realize final demand specification, product, service improvement and demonstration through continuous interaction of end users. As a result of the case analysis, the following policy tasks can be derived. First, living lab is a new concept and it is in the early stage of implementation in Korea. Therefore, it is necessary to monitor and evaluate living lab experiments and build suitable models for Korean society by sharing cases and achievements. Second, the strategic niche management are necessary for the introduction of living lab. Third, living lab can be used as a tool to transform the existing technology acquisition centered innovation policy to the policy for customer needs and problem solving. Fourth, there is a need for flexibility and adaptability in strategy and system to correct errors that appear in the living lab processes.

Developing the Test Module of $Hipass^{PLUS}$ Card (하이패스플러스카드 시험 모듈 개발)

  • Lee Ki-Han;Lee Dae-Kyu;Yeo Woonsang;Lee Seung-Hwan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.2 s.3
    • /
    • pp.31-42
    • /
    • 2003
  • Prepaid plastic card issued by Korea Highway Company had a lot of problems in end-user usage and management. HipassPLUS Card, which is a smart card used for a prepaid electronic payment, overcomes the problems of Prepaid Plastic card. HipassPLUS Card is also designed be compatible to other cards such as public transportation card. Thus, for the safety of using the card in such environment, the functionality and the security of HipassPLUS card should be faultless. This paper developed a test module including the test method, the test checklist, and the test procedure to examine the functionality and security of the payment mechanism of HipassPLUS card. The test module contains the method and the procedure to test the standard items according to the test checklist of HipassPLUS card. The test items and the test checklist of HirassPLUS card was selected under the provision of the specification of Korea Highway Company and ISO standard. The results of evaluation on HipassPLUS card using the proposed test module indicates that 4he HipassPLUS card satisfied the criteria under the characteristics of the functionality, security, and compatibility.

  • PDF

A New Design and Implementation of Digital Evidence Container for Triage and Effective Investigation (디지털 증거 선별 조사의 효율성을 위한 Digital Evidence Container 설계 및 구현)

  • Lim, Kyung-Soo;Lee, Chang-Hoon;Lee, Sang-In
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.31-41
    • /
    • 2012
  • The law enforcement agencies in the worldwide are confiscating or retaining computer systems involved in a crime/civil case, if there are any, at the preliminary investigation stage, even though the case does not involve a cyber-crime. They are collecting digital evidences from the suspects's systems and using them in the essential investigation procedure. It requires much time, though, to collect, duplicate and analyze disk images in general crime cases, especially in cases in which rapid response must be taken such as kidnapping and murder cases. The enterprise forensics, moreover, it is impossible to acquire and duplicate hard disk drives in mass storage server, database server and cloud environments. Therefore, it is efficient and effective to selectively collect only traces of the behavior of the user activities on operating systems or particular files in focus of triage investigation. On the other hand, if we acquire essential digital evidences from target computer, it is not forensically sound to collect just files. We need to use standard digital evidence container from various sources to prove integrity and probative of evidence. In this article, we describe a new digital evidence container, we called Xebeg, which is easily able to preserve collected digital evidences selectively for using general technology such as XML and PKZIP compression technology, which is satisfied with generality, integrity, unification, scalability and security.

A Study on Control of Access to Internal Network Information and Authority Set Up Management for Client by Class (제한된 내부 네트워크 정보 접근제어와 계층별 클라이언트 권한설정 관리에 관한 연구)

  • Seo, Woo-Seok;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.287-293
    • /
    • 2012
  • It has been only few years that various contents information subject for information processing system has been remarkably increased in online. If we say the year 2000 is the technology based year when deluge of information and data such as real time sharing, the time since after 2000 until 2011 has been a period plentiful of application based functions and solutions. Also, as the applicable range of these information process systems extends, individual information effluence has been social issues twice in 2009 and 2010. Thus now there are continuous efforts made to develop technologies to secure and protect information. However, the range problem has been extended from the illegal access from outside to the legal access from internal user and damages by agents hidden in internal information process system and client system. Therefore, this study discusses the necessity for the studies on efficiency based information security by control of access to internal information and authority setting for administrator and internal users. Based on the result of this study, it provides data that can be used from SOHO class network to large scale for information security method.