• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.025 seconds

A Study on the Dependence of Mobile Instant Messenger (모바일 인스턴트 메신저 의존도에 관한 연구)

  • Kim, Jae-Jon;Lee, Yunhee;Nho, Hee-Ock;Park, Kyung-Ja
    • The Journal of Information Systems
    • /
    • v.23 no.1
    • /
    • pp.225-246
    • /
    • 2014
  • With the recent establishment of a ubiquitous environment and the paradigm shift to a smart society, the use of mobile devices, such as smart phones and tablet PCs, has become widespread. Thus, the trend is gradually shifting from using Web-based Instant Messenger to using Mobile-based Instant Messenger. Mobile Instant Messenger refers to a service that allows instant messaging as well as data sending and receiving between individuals with exclusive application programs(mobile Apps), which can be used in portable devices-such as smart phones-with wireless Internet access. Korea's portal sites, telecommunication companies, and even big companies have all rushed into the MIM market to join the competition. The reason so many companies are showing interest in the MIM business is because it is rising as a core platform to substitute portal sites in the mobile society, and MIM is perceived as the best means to attract and secure users. The intention to reuse or use continually was considered an important factor in maintaining a dominant position amidst such fierce competition, and consequently, most research thus far has reflected such thought. However, the frequent or long-term use of a system alone cannot indicate the definite success of the system, nor guarantee its dominant position in the market. On the contrary, MIM dependence, which goes beyond simple repetitive use and indicates a state where users actually or emotionally depend on a specific system, can better explain the user action. However, not much research has been conducted on dependence. The research results showed that lively message, concise message, message responsiveness, and social belonging significantly affected perceived usefulness. Message responsiveness, Link, and social belonging significantly affected flow. Flow significantly affected MIM dependence, and perceived usefulness did not affect MIM dependence. This study has proven that lively message, concise message, message responsiveness, Link, social belonging and perceived usefulness are important antecedents and mediating factors of MIM dependence. Moreover, this study is significant in that it explains the overall process of MIM dependence, and expands on the variety and scope of research that can be applied to MIM-related studies.

Keystroke Application Technique for User Authentication in E-Learning System (이러닝 시스템에서 사용자 인증을 위한 키스트로크의 응용 기술)

  • Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik;Moon, Nam-Mee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.25-31
    • /
    • 2008
  • It is important for users to be confirming in e-Leaning system, because legitimate learner should be joined to the system for teaming and testing Thus, most system for authentication was verified using id and password with learner's id and password. In this case, It can be easy for hackers to steal learner's id and password. In addition, soma learner gets another to sit for the examination for one with another person id and password. For the solution like this problem it needs a biometrics authentication for complement. This method is required so much extra cost as well as are an unwanted concern. Therefore, we proposed keystroke technique to decide which learners are righteous or unlawful in this paper. In addition, we applied statistics and neural network for the performance of keystroke system. As a result, the performance of FAR and FRR in keystroke authentication was increased by proposed method.

Customer Satisfaction Improvement by Combining the Blue Print and Reliability Technique: Education Service Case Study (Blue Print와 신뢰성 기법을 혼합한 고객만족도 향상에 관한 연구: 교육서비스 사례)

  • Baek, Chun-Joo;Koo, Il-Seob;Lim, Ik-Sung;Kwon, Hong-Kyu
    • Journal of Applied Reliability
    • /
    • v.12 no.1
    • /
    • pp.13-24
    • /
    • 2012
  • This paper applied the Blue Print and FMEA (Failure Mode and Effect Analysis) to education service in order to raise the education service satisfaction. First, the Blue Print is deployed to come up with strategies to overcome the fail possibility point and waiting point. Next, in order to analyze the fail factors and alternative strategies, the Blue Print of education service is applied to FMEA. The results are as follows; first, the ommission from information document by web-mail or e-mail, Second, thing that selected in spite of company uneducated, thing that omitted despite the company is target, and the unsatisfaction of attendee about training contents. Third, the delay of counsel at the telephone reply, erroneous list of course name and attendee at HRD (Human Resource Development), omission of check whether attends or not. Except for unsatisfaction of attendee, all appears at the process that service delivered. And the unsatisfaction of attendee is about education contents. Both is the factor which have influence on the education service quality. The strategies to remove the failure mode are training and manual development on service and work, a thorough management and check of information system like as ERP (Enterprise Resoure Planning), HRD, education institution list DB (Data Base), on-line application system, a development of education program to offer best education that reflect the user needs and continuously changing environment.

Assessment of ASP-PMIS Quality in Korea

  • Lee, Seul-Ki;Yu, Jung-Ho
    • Journal of Construction Engineering and Project Management
    • /
    • v.1 no.3
    • /
    • pp.9-17
    • /
    • 2011
  • Web-based PMIS (Project Management Information System) has played significant role in construction management processes in Korea. As the use of web-based PMIS increases, regular quality assessment to identify user's requirements is necessary. However, there have been rare research efforts for quality assessment of web-based PMIS. This study aims to assess the quality of web-based PMIS, especially ASP-PMIS (Application Service Provider based PMIS) that is widely used in Korean construction industry. The assessment factors of ASP-PMIS quality were adopted from previous research and empirically confirmed using exploratory factor analysis. ISA (Importance-Satisfaction Analysis), which is a variation of original IPA (Importance-Performance Analysis), were selected for the assessment and analysis method in this research. A total of 253 completed questionnaires, composed of 23 assessment items, were collected from the ASP-PMIS users in Korea (construction managers and constructors), and they were used to analyse the quality of the systems. Some possible contributions of this research are: it introduces a simple and easy-to-use tool for assessing the quality of ASP-PMIS with a set of quality assessment factors that are selected from previous researches and empirically tested; it provides the quality assessment results of ASP-PMIS in Korea so that ASP-PMIS providers in Korea can understand the users' opinion on their systems; it also identified that the urgent factors that require immediate attention to improvement. However, further researches are to be required on the following areas: enhancing the quality assessment factors in terms of their relation to the success of ASP-PMIS and to the users' performance; assessing and analyzing the quality of individual ASP-PMIS; establishing continuous improvement systems institutionally and instrumentally.

The Significance of Semiotics for Visual Web Interface (시각적 웹 인터페이스에 대한 기호학 의미)

  • Jang, Seung-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.4
    • /
    • pp.795-802
    • /
    • 2018
  • This study describes the semantic theoretic interpretation through the extensive use of semantic metaphors for intensive web interface with information and the metaphoric value of metaphors for interface design. Common factors that influence web design are empirical establishment and verification for generating web symbols and these are have important elemental perspectives that are used to assess the usefulness and key elements of the site. In addition, the structure of the screen has begun to change dynamically from the application of web technological functions, and the media functions have become important to make web standards when implementing visual structuring from the perspective of semiotic. Instead of using a technical expression approach to examine semiotic, a semiotic approach is applied to create aesthetic codes through the human-computer interface in terms of semiotic in a variety of natural and universal fields. Based on this, it is used as means of communication to convey the intended meaning to users so as to highlight the importance of the usability issues and metaphors user interface.

A Study of node Authentication in Ad-hoc Network using Java Card (자바 카드를 이용한 Ad-hoc망의 노드 인증에 관한 연구)

  • Lee, Cheol-Seung;Shin, Myeong-Sook;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.902-905
    • /
    • 2005
  • In this paper we challenge the mobile node Authentication using Java Card authentication protocol in Ad-hoc network environment. Ad-hoc network is a collection of wireless mobile nodes without the support of a stationary infrastructure. and DSR routing protocol, which is one of famous mobile ad-hoc rooting protocols, has the following network path problem. this paper is the security structure that defined in a mobile network and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses Ad-hoc based structure and transmission hierarchical security back of a mobile network, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Java Card Authentication of mobile node can possibly be applied to the area of M-Commerce, Wireless Security, and Ubiquitous Computing and so on.

  • PDF

Wireless Webcam Implementation and Application Utilizing Wireless USB Technology (무선 USB 기술을 활용한 무선웹캠 구현 및 적용방법)

  • Chae, Jung-Sik;Ban, Tae-Hak;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.569-575
    • /
    • 2014
  • These days as smart TVs or android set top boxes have come into wide use, VoIP(Voice over Internet Protocol) services such as the Skype which can beused on computer system, can be also accessed by smart TVs or set top boxes. and the various kinds of distance learning programs have been developed on smart TVs or set top boxes. but when users have utilized a webcam with smart TVs or set top boxes, users have to go in front of smart TVs or set top boxes In this research paper, the new technology can be solved the problem of webcam use according to chaned environment. This tech is related with the wireless webcam one which can be applicable to open spaces such as living room with some distance between user and smart TV. There are few problems in long distance the test results show high reliability in living room with some distance.

LED Lighting Monitoring System Using Bluetooth BLE (Bluetooth BLE를 활용한 LED 조명 관제시스템에 관한 연구)

  • Oh, Am-suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.367-372
    • /
    • 2017
  • LED illumination has been developed from simple illumination to human oriented multi-functional system depending on the IT convergence trends. Thus, the convergence of IT technology such as various types of sensor and communication functions with application software can make saving of energy, and there are also several needs about the tailor-made illuminations requirements for the diverse users who want to take their own colors, strengths of the light. For the adaption of these kinds of intelligent system illumination, user oriented sensor and control should be possible. The LED lighting control system transmits and receives data via the Bluetooth mesh network and provides functions such as LED lighting control, LED lighting condition monitoring, energy usage monitoring, and energy peak point management. Therefore, in this paper, we suggest wireless communication platform and control system for the LED illumination control. We can expect life extension of LED illumination, and energy saving through this suggested system.

Application of Augmented Reality Technology to small-unit's field training and Legal System Analysis (증강현실 기술의 소부대 야외 전술훈련 활용 방안 및 법제도에 관한 고찰)

  • Kim, Kyoung Min;Park, Sangjun;Kim, Jee Won;Kim, Hoedong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.7
    • /
    • pp.963-969
    • /
    • 2018
  • According to the dictionary definition Augmented Reality Technology is "an enhanced version of reality where live direct or indirect views of physical real-world environments are augmented with superimposed computer-generated images over a user's view of the real-world, thus enhancing one's current perception of reality". Since civilian property damages, noise and accidents during the field exercise by military or drills so that AR technology are indispensible with small units drills in Army. However because AR technology which Army has adopted are usually use for special units or need separate spaces which costs lots of budgets, those are not fit for small unit drills or tactics in regular Army. In this regards this paper suggests the AR technology which can apply small unit drill field and the efficiency and legal concerns thereof as well.

A study on the evaluation of package software documentation to improve software quality (패키지 문서 평가를 통한 소프트웨어 품질 확립에 관한 연구)

  • Kim, Hyo-Yeong;Kim, Han-Han;Han, Hyeok-Su;Kim, Sun-Yong;Sin, Seok-Gyu;Jeong, Yeong-Eun
    • The KIPS Transactions:PartD
    • /
    • v.9D no.4
    • /
    • pp.629-638
    • /
    • 2002
  • As the application area of software grows bigger and the importance of software quality increases, software quality evaluation method is also getting a lot of attention. To evaluate the software quality properly, we need an objective and concrete evaluation mechanism. In general, practitioners customize the international standards to their own needs for this purpose. Package software documents plat an important role in software quality evaluation because it provides the information that helps customers use the software effectively and conveniently. h great deal of efforts has been made in terms of international standards for documentation and documentation process. However, those international standards are too abstract to be applied directly to domestic software packages. In this paper, we developed a guidelines and checklists for writing and evaluating package software documents. Our research basically followed ISO 12119, ISO 9127 and some related research results. Also we proved the effectiveness of this research through actual tests with package softwares.