• Title/Summary/Keyword: Usage Agreement

Search Result 81, Processing Time 0.026 seconds

Study on Factors Affecting Effects of Online Behavioral Advertising (온라인 맞춤형 광고 효과에 미치는 요인들 연구)

  • Um, Namhyun;Kim, Sojung
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.376-388
    • /
    • 2019
  • One important online marketing practice to emerge in recent years is online behavioral advertising. Online behavioral advertising entails a range of issues, including the following: personal information collection and usage agreements (three conditions: no agreement, agreement, or agreement with a reward), consumers' levels of perceived personalization (low vs. high), and consumers' level of online privacy concerns (low vs. high). The effects of all these is what this study is designed to examine, as it evaluates online behavioral advertising. Study findings suggest that types of information collection and usage agreement play a pivotal role in the evaluation of online behavioral ads. Individuals who provided the informed consent form with the possible reward had a more favorable attitude toward the brand than individuals who provided the informed consent form without a possible reward. In terms of personalization, the level of perceived personalization of the advertising message impacted consumers' attitudes toward the online behavioral ad and toward the brand. Finally, online privacy concerns appear to impact consumers' attitudes toward the online behavioral ad and toward the brand. Theoretical and practical implications are also discussed.

AHP Usage Pattern As a GDSS Toward the Various Task Types: IS Theory Testing (다양한 문제형태에 대한 AHP의 GDSS사용특성: IS이론을 중심으로)

  • 손달호
    • Korean Management Science Review
    • /
    • v.13 no.3
    • /
    • pp.115-128
    • /
    • 1996
  • System usage, the utilization of information technology(IT) by individuals, groups or organizations, is a core variable in IS research. Indeed, there is widespread agreement among researchers that system usage is the primary variable through which IT affects white collar performance because it is a requisite, albeit insufficient, for deriving the benefits of IT. Furthermore, system usage has a notable practical value for managers interested in evaluating the impact of IT. Despite the number of studies of targeted at explaining system usage, there are more areas which required for the verification of system usage. The purpose of this paper is to address, using the Technological Acceptance Model (TAM), the usage pattern of AHP toward the various task in group decision (GD). The result showed that, for the all of the task types, perceived usage (PU) has more effect than perceived ease-of-use(PEU) on the AHP usage. However, more researches are required to generalize the result of this study.

  • PDF

Service Level Agreement: Conceptual Model and Critical Success Factors (아웃소싱의 서비스 수준협약서에 관한 사례연구: 개념적 모형과 성공요인)

  • Kim, Seung-Yoon;Kim, Se-Han;Kim, Jin-Hwa;Nam, Ki-Chan
    • Asia pacific journal of information systems
    • /
    • v.14 no.3
    • /
    • pp.23-55
    • /
    • 2004
  • Interests on Service Level Agreement(SLA), an immanence operating tool for managing the level of the information system service objectively and qualitatively, were raised among IT outsourcing service providers, outsourcers, and operating departments. Yet, only a few domestic conglomerates adopted the SLA, and exact usage of the SLA is currently unknown. Because of the importance of the SLA between a service recipient and a service provider, the agreement is treated with high confidentiality. This raised the problems to organizations which are considering the SLA but lack in the concrete guide line to internalize SLA management process. This study provides the process model of implementation for SLA by conducting multiple case research. The sampled companies are currently implementing the SLA over 1 year of usage period. Factors were used to provide the managerial contribution for implementing the SLA. To analyse the case samples, in-depth interview method was conducted for each sampled company. As a result, if SLA can be used as an immanence managerial tool and can be actively implemented, it will be an strategic tool for various decision making in IT management practice with long term relationship, better shared partnership, and continuous service improvement.

A Study on the Architectural Agreement Contents -A case Study of Kyoto in Japan- (건축협정내용에 관한 연구 -일본 교토시의 합의협정지구를 대상으로-)

  • Weon, se yong
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.8 no.3
    • /
    • pp.51-58
    • /
    • 2006
  • It is a study about an architectural agreement contents of Kyoto in Japan. For will including in the near future, new system need to solve people misunderstanding worrying about excessive restriction, and strive for interests among construction, as well as it is helpful to central administration for system propulsion finance and regional administration having to work practical. This study is about an Architectural rule on the architectural agreement contents in agreement of residents. Because This rule is necessary to introduce in Korea, because is possible to conserve regional characteristic in urban.

  • PDF

전자 CORPUS를 이용한 정보통신 분야 영 어 학습(ESP)

  • 한인석
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 2001.06a
    • /
    • pp.185-197
    • /
    • 2001
  • It is quite burden-some for non-native speakers of English to write and read more and more IT-related reports due to the rapid development of IT technology. Thus, this study aims at designing ESP materials by using huge volume of electronic ITU texts, corpora and concordancer SW. Various tests are designed to study the usage of articles, hyponym, agreement, synonym, and others. The results of this study will bring general and practical benefits to technical English writing and improving IT area students' lexical knowledge of actual English usage. The ESP materials produced by this study will also make an extensive contribution to other industries and academic areas in Korean society.

  • PDF

The Software Architecture of A Secure and Efficient Group Key Agreement Protocol

  • Lopez-Benitez, Noe
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.21-25
    • /
    • 2014
  • Group communications are becoming popular in Internet applications such as video conferences, on-line chatting programs, games, and gambling. Secure and efficient group communication is needed for message integration, confidentiality, and system usability. However, the conventional group key agreement protocols are too much focused on minimizing the computational overhead by concentrating on generating the common group key efficiently for secure communication. As a result, the common group key is generated efficiently but a failure in authentication allows adversaries to obtain valuable information during the group communication. After achieving the secure group communication, the secure group communication should generate the group key efficiently and distribute it to group members securely, so the balance of security and system usage must be considered at the same time. Therefore, this research proposes the software architecture model of a secure and efficient group communication that will be imbedded into networking applications.

  • PDF

A Resource-Optimal Key Pre-distribution Scheme for Secure Wireless Sensor Networks

  • Dai Tran Thanh;Hieu Cao Trong;Hong Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1113-1116
    • /
    • 2006
  • Security in wireless sensor networks is very pressing especially when sensor nodes are deployed in hostile environments. To obtain security purposes, it is essential to be able to encrypt and authenticate messages sent amongst sensor nodes. Keys for encryption and authentication must be agreed upon by communicating nodes. Due to resource limitations and other unique features, obtaining such key agreement in wireless sensor network is extremely complex. Many key agreement schemes used in general networks, such as trusted server, Diffie-Hellman and public-key based schemes, are not suitable for wireless sensor networks [1], [2], [5], [7], [8]. In that situation, key pre-distribution scheme has been emerged and considered as the most appropriate scheme [2], [5], [7]. Based on that sense, we propose a new resource-optimal key pre-distribution scheme utilizing merits of the two existing key pre-distribution schemes [3], [4]. Our scheme exhibits the fascinating properties: substantial improvement in sensors' resource usage, rigorous guarantee of successfully deriving pairwise keys between any pair of nodes, greatly improved network resiliency against node capture attack. We also present a detailed analysis in terms of security and resource usage of the scheme.

  • PDF

Energy and Service Level Agreement Aware Resource Allocation Heuristics for Cloud Data Centers

  • Sutha, K.;Nawaz, G.M.Kadhar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5357-5381
    • /
    • 2018
  • Cloud computing offers a wide range of on-demand resources over the internet. Utility-based resource allocation in cloud data centers significantly increases the number of cloud users. Heavy usage of cloud data center encounters many problems such as sacrificing system performance, increasing operational cost and high-energy consumption. Therefore, the result of the system damages the environment extremely due to heavy carbon (CO2) emission. However, dynamic allocation of energy-efficient resources in cloud data centers overcomes these problems. In this paper, we have proposed Energy and Service Level Agreement (SLA) Aware Resource Allocation Heuristic Algorithms. These algorithms are essential for reducing power consumption and SLA violation without diminishing the performance and Quality-of-Service (QoS) in cloud data centers. Our proposed model is organized as follows: a) SLA violation detection model is used to prevent Virtual Machines (VMs) from overloaded and underloaded host usage; b) for reducing power consumption of VMs, we have introduced Enhanced minPower and maxUtilization (EMPMU) VM migration policy; and c) efficient utilization of cloud resources and VM placement are achieved using SLA-aware Modified Best Fit Decreasing (MBFD) algorithm. We have validated our test results using CloudSim toolkit 3.0.3. Finally, experimental results have shown better resource utilization, reduced energy consumption and SLA violation in heterogeneous dynamic cloud environment.

아웃소싱의 서비스 수준 협약 : 개념적 모형과 성공 요인에 관한 연구

  • Kim Se Han;Nam Gi Chan;Kim Seung Yun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.05a
    • /
    • pp.312-319
    • /
    • 2003
  • In late 90s, organizations recognized the information technology as an key enabler of the business strategic accomplishment which lead them heavy increment on IT investment. These organizations tried to hold the competitive advantage by focusing on their core competency. And these acts raise their interests on IT outsourcing. Recent trends of the organizations concern on evaluating the effectiveness of the previous IT investment and the reasonable selection on IT investment type. Also, the objective evaluation of the service level and continuous improvement are major concern of the outsourcer. Consequently, interests on Service Level Agreement (SLA), an immanence operating tool for managing the level of the information system service objectively and qualitatively, were raised among IT outsourcing service providers, outsourcers, and operating departments. Yet, only a few domestic conglomerates adopted the SLA, and exact usage of the SLA is currently unknown. Because of the importance of the SLA between a service provider and an outsourcer, the agreement is treated with high confidentiality. This raised the problems to both the private and public organizations, are considering the SLA, with absence of concrete guide line to internalize SLA management process. This study provides the organizational and environmental factors of the adopting and applying the Service Level Agreement (SLA) by conducting multiple case research. The sampled companies are currently implementing the SLA over 1 year of usage period. Factors were used to provide the operational contribution for implementing the SLA. The study also provides the effects on IT performance through the SLA. For this, in depth interview was conducted for each sampled company. As a result, if SLA between outsourcer and service provider can be used as an immanence operation tool and actively implemented, SLA will be an strategic tool for various decision making in IT management practice with long term relationship, better shared partnership, and continuous service improvement.

  • PDF

A Descriptive Research on Drug Use Pattern of Narcotic Analgesics: a Case of University Hospital in Korea (마약성 진통제의 사용양상에 관한 서술적 조사연구: 한 대학병원의 경우)

  • Rah, Mi-Sook;Yoo, Bong-Kyu
    • Korean Journal of Clinical Pharmacy
    • /
    • v.21 no.1
    • /
    • pp.30-35
    • /
    • 2011
  • The objective of this study was to find out drug use pattern of narcotic analgesics in university hospitals in Korea. A university hospital located in Kyungbuk province was chosen for this study. The drug use pattern was analyzed in terms of ingredient, administration route, patient type, and attending department. Amount of drug usage was counted by unit dose defined by the number of ampule or vial for injectable, tablet or capsule for oral, and each for patch preparations. Result showed that 11 narcotic analgesic ingredients were used during 2007-2009, and the drug usage was increased by about 20% annually during the period. Proportion of oral preparations used for pain management was about two third of all narcotic analgesics usage and kept increasing during the period. Proportion of the drug usage for outpatients was also steadily increased. Notably, the usage of oral preparations of oxycodone, morphine, and hydromorphone was rapidly increased for the management of cancer pain while the usage of codeine and codeine-containing composite preparations for cancer pain were minimal (<10%). About 90% of all narcotic analgesics were used by physicians in Internal Department, especially in Oncology Division of the Department. These findings suggest that pain management is becoming more aggressive and in agreement with WHO's guidelines regarding selection of administration route. However, in terms of 3-step ladder for cancer pain management, the drug use pattern was not congruent to WHO's guidelines. Therefore, in conclusion, it appears that physicians need to try to be congruent to the guidelines when using narcotic analgesics for cancer pain.