• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.033 seconds

An Application of Balanced Scorecard to EIS User Information Requirements Analysis - Small and Medium Manufacturers in Korea - (균형점수표(BSC)를 이용한 EIS 사용자의 정보요구분석 - 우리나라 중소제조업체를 중심으로 -)

  • Lee, Jeong-Hwan;Kang, Shin-Cheol
    • Asia pacific journal of information systems
    • /
    • v.11 no.1
    • /
    • pp.155-173
    • /
    • 2001
  • Assessing user information requirements is one of the most important issues in building Executive Information Systems. Application of the Balanced Score Card method as a tool for strategic planning and performance measurement has been increasing recently in various fields. However there has been meager attempt to apply the method to user requirement analysis, in particular, for small and medium sized companies. This study surveyed 79 executives of small and medium sized companies in Korea. The study founds the applicability of BSC for analyzing user requirements of EIS, in terms of financial, customer, internal process, learning and growth perspectives. The paper also suggested several guidelines for using BSC to improve user satisfaction to the practitioners who are operating or planning to build EIS in the small and medium sized companies.

  • PDF

A Study on Implementation of the Mobile Application of Aid to Navigation Using Location-based Augmented Reality

  • Jeon, Joong-Sung
    • Journal of Navigation and Port Research
    • /
    • v.43 no.5
    • /
    • pp.281-288
    • /
    • 2019
  • In this paper, we implemented a mobile application of location-based augmented reality that combines self-sensing technology and various safety information using technological advancements of the smartphone. Vessel navigation is a suitable area for augmented reality because it requires accurate knowledge of the distance and location of destinations, danger zones, AtoN, and adjacent vessels. Current smartphone applications only provide 2D images and location information. Such applications do not include information about the surrounding environment, and as a result, they can only function using their own sensing information and surrounding information into a location-based augmented reality. If you provide a variety of sensor information embedded in the smartphone to 'BadaGO', the implemented application through this study, 'BadaGO' can provide safe navigation information to the user device in real time with a variety of its own formed information. The user has a high practicality and applicability of a small ship that is supplied with safe navigation information in a changing marine environment only by providing information through the application on the smartphone.

The Concept of the Context-Aware Computing and Its Application to the Library Information Services (상황인식 컴퓨팅의 개념과 도서관 정보서비스에의 적용)

  • Lee, Jeong-Mee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.1
    • /
    • pp.179-194
    • /
    • 2012
  • This study explored the concept of context-aware computing and its application to the library and information services. Context-aware computing represents mobile computing techniques which gather, analyze user's contextual information and provide appropriate information services for the specific user. The idea was proposed in the late 90's but it was not widely available to the public because of the technology limitation. Recent technology development made context-aware computing possible to apply to our everyday-life information seeking using smart phone and showed the usefulness of its application. This study introduced the concept of context-aware computing with some examples of it, and finally tried to propose some of its applications to the library and information services.

Mobile Donation Application of User Participation Base (사용자 참여 기반의 모바일 기부 어플리케이션)

  • Chung, Myoung-Beom;Ko, Il-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.113-122
    • /
    • 2011
  • In this paper, we propose an iPhone application that allows the user to pay for donations using the camera, GPS and call functions of the iPhone. As iOS version 3.0 allows the iPhone camera to detect and read bar codes and QR codes, the proposed application uses such codes to identify a product the user wishes to donation. After determining the user's location using the iPhone GPS function, the application can then perform a navigation task that guides the user to a suitable shop or store where the user can make his or her donation. In addition, the application offers an ARS call function that allows the user to make a direct donation, even if the user does not know the telephone number for making such donations. Therefore, the proposed application provides an easy means for the user to pay for donations directly or indirectly.

A Performance Comparative between WAP Service and JAVA Wireless Internet Service (무선 인터넷의 WAP 기반 서비스와 자바 기반 서비스간의 성능 비교)

  • 오기욱
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.2
    • /
    • pp.122-128
    • /
    • 2003
  • There are many development methods to implement wireless internet service. These methods are WAP(Wireless Application Protocol) based services and Java based service WAP based service has been proposed to support limited convenience for user But Java based service can support many convenience and GUI(Graphic User Interface) and easy to use to access for user. This paper will be propose a WAP based application development method and Java based application development method. As an illustrative experiment, WAP based service and Java based service are used to show performance for each systems.

  • PDF

A Cloud-Based User-Friendly DRM System

  • Lee, Suk Ja;Wang, Jing;Rhee, Kyung-Hyune
    • Annual Conference of KIPS
    • /
    • 2013.05a
    • /
    • pp.636-639
    • /
    • 2013
  • With the development and rapid growth of cloud computing, lots of application services based on cloud computing have been developed. In addition, cloud-based DRM systems have been developed to support those services' copyright and privacy protection. In this paper, we propose a new cloud-based user-friendly DRM system, which allows users to execute the same contents bought at most n times at any devices with license enforcement, which checks the validation of licenses before every execution, having no smart card, which has to carry a smart card reader that seems troublesome to a user, and providing the copyright and privacy protection.

FIDO Universal Authentication System Based on Blockchain (블록체인 기반의 FIDO 범용 인증 시스템)

  • Kim, S.H.;Huh, S.Y.;Cho, Y.S.;Cho, S.R.;Kim, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.1
    • /
    • pp.34-44
    • /
    • 2018
  • In this paper, we describe a FIDO universal authentication system based on a Blockchain that can share the user's FIDO authentication information between the application services of multiple domains without the use of a server. In addition we provide a method to query the FIDO authentication information of the user recorded in the Blockchain using only the user's service ID. Therefore, even if the user executes the FIDO registration process only once, the user can use the FIDO authentication service of another application service without repeating an additional FIDO registration procedure, and the service provider can securely share and utilize the FIDO authentication information of the user without the use of a trusted third party, thereby lowering the deployment and maintenance costs of the FIDO server.

User Interface Design & Evaluation of Mobile Applications

  • Samrgandi, Najwa
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.55-63
    • /
    • 2021
  • The design functionality put forward by mapping the interactiveness of information. The presentation of such information with the user interface model indicates that the guidelines, concepts, and workflows form the deliverables and milestones for achieving a visualized design, therefore forming the right trend is significant to ensure compliance in terms of changing consideration and applying evaluation in the early stages. It is evidenced that prototype design is guided by improvement specifications, includes modes, and variables that increase improvements. The study presents five user interface testing methods. The testing methods are heuristic evaluation, perspective-based user interface testing, cognitive walkthrough, pluralistic walkthrough, and formal usability inspection. It appears that the five testing methods can be combined and matched to produce reasonable results. At last, the study presents different mobile application designs for student projects besides the evaluation of mobile application designs to consider the user needs and usability.

Improved User Privacy in SocialNetworks Based on Hash Function

  • Alrwuili, Kawthar;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.97-104
    • /
    • 2022
  • In recent years, data privacy has become increasingly important. The goal of network cryptography is to protect data while it is being transmitted over the internet or a network. Social media and smartphone apps collect a lot of personal data which if exposed, might be damaging to privacy. As a result, sensitive data is exposed and data is shared without the data owner's consent. Personal Information is one of the concerns in data privacy. Protecting user data and sensitive information is the first step to keeping user data private. Many applications user data can be found on other websites. In this paper, we discuss the issue of privacy and suggest a mechanism for keeping user data hidden in other applications.

UX design strategy for Education Mobile app based on User Value (사용자 가치 기반에 의한 교육용 모바일 앱의 UX디자인 설계전략)

  • Choi, Eun-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1386-1392
    • /
    • 2017
  • With the active usage of digital media, the importance of and the interest in User Interface (UI)/User Experience (UX) have been increasing. This study proposes the development of design evaluation model to utilize the quality analysis model as a basis if there were to be a development of mobile education application. Main factors of the design evaluation model, which is based on User Value analysis, influence users' attitudes and intentions in continuing their uses of a mobile education application. The employment of the design evaluation factors onto the existing agile method's development stage, therefore, would provide an optimal UX environment for the application. This application not only will increase the satisfactions of consumers, but also will have positive impacts on their intentions in continuing their uses of a mobile education application.