• Title/Summary/Keyword: User's Need

Search Result 1,063, Processing Time 0.031 seconds

A study on user Satisfaction of the Junior College Library based on its Characteristics of Space Composition (전문대학도서관의 공간구성 특성에 따른 이용만족도 연구)

  • Lee, Su-Young
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.24 no.6
    • /
    • pp.37-44
    • /
    • 2017
  • This study is about user satisfaction of the Junior College Library based on its characteristics of space composition. For this, we studied characteristics of space composition targeting the libraries in colleges in Seoul and Gyeonggi-do. First, in case of study of characteristics of space composition for books and library data, student satisfaction for traditional and normal library areas was high. It means that the service based on library areas should start from normal library areas as well as there is a change about space as the type of data in libraries change to electric data and multimedia. Second, If we look at the space for a reader and a user, satisfaction for a normal reading room was high. we can also see that satisfaction for a computer room and a multimedia reading room was not higher but still high. Also, the reason why satisfaction for a multimedia reading room that provides various activities was high was that the complex of a library space is needed to provide users with various activities. Third, in case of space for programme function and meeting, satisfaction for the room of video information and the group study room was high. we can see that user satisfaction for the space got high basically when a user is satisfied with the proper information technology based on interaction Fourth, as a result of variance analysis of 3 spaces of Junior College Library and the services, the size of the space of service does not influence user satisfaction directly. Even the space is small, if it decorates variously like with a lighting for a user, a window seat to meet the nature of users and has specific factors such as space reservation using internet, user satisfaction is high. If we summarise the result of this study, to make user satisfaction for speace in a Junior College Library higher, not just we need to try to make it extend as a educational, a cultural place but we also need to accept the student's requirement that the space also needs to be extend as a complex cultural space.

How Query by humming, a Music Information Retrieval System, is Being Used in the Music Education Classroom

  • Bradshaw, Brian
    • Journal of Multimedia Information System
    • /
    • v.4 no.3
    • /
    • pp.99-106
    • /
    • 2017
  • This study does a qualitative and quantitative analysis of how music by humming is being used by music educators in the classroom. Music by humming is part division of music information retrieval. In order to define what a music information retrieval system is first I need to define what it is. Berger and Lafferty (1999) define information retrieval as "someone doing a query to a retrieval system, a user begins with an information need. This need is an ideal document- perfect fit for the user, but almost certainly not present in the retrieval system's collection of documents. From this ideal document, the user selects a group of identifying terms. In the context of traditional IR, one could view this group of terms as akin to expanded query." Music Information Retrieval has its background in information systems, data mining, intelligent systems, library science, music history and music theory. Three rounds of surveys using question pro where completed. The study found that there were variances in knowledge, training and level of awareness of query by humming, music information retrieval systems. Those variance relationships where based on music specialty, level that they teach, and age of the respondents.

A Research on Information Security Risk-based Antecedents Influencing Electronic Commerce User's Trust (전자상거래 사용자의 신뢰에 영향을 미치는 정보보안위험 기반의 선행요인 연구)

  • Kim, Jong-Ki;Lee, Dong-Ho
    • Asia pacific journal of information systems
    • /
    • v.15 no.2
    • /
    • pp.65-96
    • /
    • 2005
  • It is generally believed that, compared to traditional commerce, Electronic Commerce(EC) is more difficult to gain and sustain customers. One of the major reasons that customers do not use EC is lack of trust. Previous researches on the EC user's trust suggested that risk is an antecedent of trust and the concept of trust is highly related to risk. This study proposed a combined model in which includes the factors based on generic information security risk analysis methodology and trust factors in EC. The objectives of this study are follows; first, investigating the relationship between trust and risk that are antecedent factors of purchase intention, and second, examining the validity of information security risk analysis approach in EC environment. Based on the survey results of 143 MBA students statistical analysis showed that factors like threats and controls were significantly related to risk, but assets did not have statistically significant relationship with risk. Controls and knowledge of EC had meaningful effect on user's trust. This study found that risk analysis methodology which is generally used at organizational level is practically useful at user level on EC environment. In conclusion, the results of this study would be applied to generic situation of information security for analyzing and managing the risk. Besides, this study emphasized that EC vendors need to pay more attention to the information security risk to gain customer's trust.

User Event Analyzer for Bidirectional DMB Data Service (양방향 DMB 서비스를 위한 사용자 이벤트 분석 모듈)

  • Li, Song-Lu;Khin, Hlaing Su;Kim, Sang-Wook
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.624-629
    • /
    • 2007
  • Digital Multimedia Broadcasting (DMB) is a digital radio transmission system for sending multimedia such as radio, TV, and data casting to mobile devices. Nowadays, DMB specifications are the major standard for digital broadcasting and have been establishing for bidirectional service using MPEG-4 system. But there has been only some simple demonstrated system for this bidirectional services. In this paper, we introduce bidirectional DMB data service system that provides the interaction between the user and DMB server without any additional equipment such as web server. The proposed bidirectional DMB system can capture and send user interaction information and response through the existing DMB transmission channel, finally update the original contents. The action event from the user is the most important thing in developing the bidirectional DMB system. Therefor, capturing the event data from the user is the first step we need to do for the bidirectional DMB service. In this paper, we propose an interaction manager module for the user events. This system will extract the user events and make a plan to update the original scene with the server's reaction information.

  • PDF

A Study on the Use Activation of the Cloud Office with Focus on DeLone and McLean IS Success Model (클라우드 오피스 이용 활성화 : DeLone and McLean 정보시스템 성공모형의 적용)

  • Yoon, Seong-Jeong;Kim, Min-Yong
    • Journal of Information Technology Services
    • /
    • v.14 no.2
    • /
    • pp.289-314
    • /
    • 2015
  • Recently, Most of the companies and government offices are under consideration about the adoption of cloud office service to actualize the smart work policies. Comparing with traditional office software, a cloud office service have the advantage of the method of payment and coming over the physical limitations. Many cloud office service users tend to adopt an official evaluated the service without doubt. However after deciding to adopt cloud office service, many users are faced with a variety of problems and difficulties practically. In this study, researchers carried out interview about those problems and difficulties after adopting a cloud office service. Consequently, there are several problems and difficulties such as compatibility, document security, document lost and maladjusted to the new graphic user interface between traditional office software and a cloud office service. A cloud office service have still several advantages not only a competitive price but also ubiquitous attributes. Thus, researchers need to study about what kinds of reason variables can solve those problems and difficulties. In existing research, DeLone & McLean have suggested information system success model. They use three independent variables which are system quality, information quality, service quality. Parameters are user satisfaction, intention to use and use. Lastly, dependent variables are net benefits. However in this study, we need to change the scope of measurement. In other words, we have to replace parameters with dependent variables. Simply, user satisfaction, intention to use and use is going to be dependent variables. There are several reasons why we need changing variables. First, we aim at giving a some suggestions to a cloud service providers which independent variables do not work to satisfy for the users. Second, we need to find out how to maximize cloud office service user's satisfaction and intention to use. Third, we should firstly know that relationship between independent variables and dependent variables. Finally, those research results give for the cloud office service provider to solve the cloud office service adopting problems and difficulties.

A New Roaming Authentication Framework For Wireless Communication

  • Li, Xiaowei;Zhang, Yuqing;Liu, Xuefeng;Cao, Jin;Zhao, Qianqian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.2061-2080
    • /
    • 2013
  • Roaming authentication protocol is widely used in wireless network which can enable a seamless service for the mobile users. However, the classical approach requires the home server's participation during the authentication between the mobile user and the foreign server. So the more the roaming requests are performed the heavier burden will be on the home server. In this paper, we propose a new roaming authentication framework for wireless communication without the home server's participation. The new roaming authentication protocol in the new framework takes advantage of the ID-based cryptography and provides user anonymity. It has good performance compared with the roaming authentication protocols whose authentication do not need the home server's participation in terms of security and computation costs. Moreover, a new User-to-User authentication protocol in the new framework is also present. All the authentications proposed in this paper can be regarded as a common construction and can be applied to various kinds of wireless networks such as Cellular Networks, Wireless Mesh Networks and Vehicle Networks.

A Dynamic Frequency Allocation for Provisioning QoS in Cognitive Radio System (무선 인지 기반 시스템에서 QoS 보장 동적 주파수 할당)

  • Lee, Mun-Ho;Lee, Jong-Chan
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2008.10b
    • /
    • pp.634-642
    • /
    • 2008
  • Radio wave is the valuable resources in $21^{st}$ century. It will be widely used in various applications such as DMB, USN, telematics, and home network as well as mobile and wireless communications. Cognitive Radio technology is devised to maximize the utilization of radio resources by sensing near-by spectrum and dynamic and allocating free resources dynamically and adaptively. Wireless links for the secondary user need to be frequently switched to idle frequencies during the transmission of multimedia data in the cognitive radio based system. This may cause delay and information loss, and QoS degradations occur inevitably. The efficient frequency allocation scheme is necessary to support the seamless multimedia service to the secondary user while maintaining QoS of the primary user. This paper suggests a frequency selection scheme which considers other parameters such as cell load, data rate, and available bandwidth than just received signal strength during the frequency selection process. The performance of our proposed scheme is analyzed by simulation.

  • PDF

The effect of the user experience of smart phone on satisfaction (스마트폰의 사용자 경험이 만족에 미치는 영향 연구)

  • Jung, Sang-Rae;Shin, Hyun-Shik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1087-1093
    • /
    • 2012
  • The effect of the user experience of smart phone on satisfaction. This research is to study the effect of the user experience factors of smart phone on customer satisfaction. User experience factors represent Usefulness, Usability, Affect and Brand images, based on antecedent literatures. And The targets of this study is 95 people in using S's company and 90 people in using A's company. As a result of this research, practicality(47.7%), offline issues(28.8%), usability(18.0%), aesthetics(17.6%) are identified for the effect of user experience on satisfaction. Most of the smart phone designer should consider that usefulness and affect are key factors, when they are designed for user-friendly in that they increase user satisfaction. In terms of these, we suggest that the fact that S's affect doesn't have effect on satisfaction is an urgent need for improvement.

Design of a Secure Payment Mechanism based on S/MIME (S/MIME을 적용한 안전한 지불 메커니즘 설계)

  • Chun, Cheul-Woo;Lee, Jong-Hu;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.482-494
    • /
    • 2002
  • In E-mail based accounting system, the remitter does not have need to find collector's account number. To transfer money to a collector's account, what remitter need is just a collector's E-mail address. But the current E-mail based accounting systems are built on SSL technology. Basically SSL provides some security services - confidentiality, user authentication and data integrity, but does not provide non-repudiation. So, in the current E-mail based accounting system, it is possible to deny transaction. And there is no receipt of transaction. In this paper, we design and implementation of a S/MIME applied Secure Payment Mechanism. In our system, every account information - account number, receiver name, amount of money, etc. - is included in a 'check' message. And this message is protected under the Secure Web-mail using S/MIME. In a view point of the convenience, users using our system do not have need to find collector's account number. And in a view point of the security, our system provides confidentiality, user authentication, data integrity and non-repudiation. Moreover our system provides a receipt.

A Study on User Needs Cognition on Functions of Mobile Phone - Focused on Use Frequency and Necessity on Functions of Age Group (휴대폰의 기능에 대한 사용자 요구 인식에 관한 연구 - 20대, 30대, 50대 사용자의 휴대폰 기능별 사용 빈도와 필요성 인식을 중심으로)

  • Park, Min-Hee;Lee, Sung-Tae
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.465-469
    • /
    • 2008
  • Mobile phone becomes composite product which the high technological multimedia functions of a Digital camera, MP3, MP4, Blue-tooth, DMB over basic functions of a calling and 3M3. By the view of user, many functions give a heavy burden rather than supporting convenient function itself because it is complex for user to use it. We want to evaluate how users feel using mobile phone according to age, comparing use frequency and necessity. So survey is tried to figure out the difference between use frequency and necessity by dividing three groups into 20s and 30s and 50s. As a result, difference of use frequency and necessity for functions of mobile phone between 20s and 30s and 50s. And the other users have the difference. Consequently, mobile phone development according to age is necessary to satisfy user's desire, evaluating elements research of user preference. We hope this paper can contribute to mobile phone development as a basic guidance.

  • PDF