• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.036 seconds

A Study on the Influence of Mobile Music Application Users' Social Experience on Purchasing Intention - The Mediating Effect of Brand Attachment

  • Li, Jingrong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.7
    • /
    • pp.53-60
    • /
    • 2019
  • With the gradual in-depth use of social elements, music social networking has attracted more and more attention and discussion in the industry. Therefore, starting from the user experience theory and purchase intention theory, this paper explores the mechanism of user social experience and purchase intention in mobile music applications, and adds the mediating role of brand attachment on the basis of literature research. Based on previous studies on user experience measurement of social network and evaluation report of mobile music applications in the industry, and combined with in-depth interviews of users, whether the user experience of mobile music applications, which pays more and more attention to social elements, has an impact on purchase intention or not? What specific social experience can help form purchase intention? Are mediating variables at work? In practice, a total of 398 formal questionnaires were collected to obtain first-hand data. Later, reliability analysis, factor analysis and structural equation model test were carried out successively to verify the hypothesis. According to the results of empirical research, firstly, content experience, atmosphere experience and interactive experience in users' social experience of mobile music applications have a significant impact on brand attachment, secondly, atmosphere experience has a significant impact on purchase intention, and thirdly, brand attachment has a significant impact on users' purchase intention. Fourthly, brand attachment plays an intermediary role in the relationship between users' atmosphere experience and content experience and purchase intention. Based on the above research conclusions, the author puts forward corresponding marketing strategy Suggestions, which have certain guiding significance for mobile music applications to improve users' purchase intention, and have certain reference significance for the development of mobile music applications and the expansion of business model.

Context Conflicts of Role-Based Access Control in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경의 역할 기반 접근제어에서 발생하는 상황 충돌)

  • Nam Seung-Jwa;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.37-52
    • /
    • 2005
  • Traditional access control models like role-based access control model are insufficient in security needs in ubiquitous computing environment because they take no thought of access control based on user's context or environment condition. In these days, although researches on context-aware access control using user's context or environment conditions based on role-based access control are emerged, they are on the primary stage. We present context definitions md an access control model to provide more flexible and dynamic context-aware access control based on role-based access control. Specially, we describe the conflict problems occurred in the middle of making an access decision. After classifying the conflict problems, we show some resolutions to solve them. In conclusion, we will lay the foundations of the development of security policy and model assuring right user of right object(or resource) and application service through pre-defined context and context classification in ubiquitous computing environments. Beyond the simplicity of access to objects by authorized users, we assure that user can access to the object, resource, or service anywhere and anytime according to right context.

Fall Detection System using Smartphone for Mobile Healthcare (모바일 헬스케어 지원을 위한 스마트폰을 이용한 낙상 감지 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.435-447
    • /
    • 2013
  • If we use a smartphone to analyze and detect falling, it is a huge advantage that the person with a sensor attached to one's body is free from awareness of difference and limitation of space, unlike attaching sensors on certain fixed areas. In this paper, we suggested effective posture analysis of smartphone users, and fall detecting system. Suggested algorithm enables to detect falling accurately by using the fact that instantaneous change of acceleration sensor is different according to user's posture. Since mobile applications working on smart phones are low in compatibility according to mobile platforms, it is a constraint that new development is needed which is suitable for sensor equipment's characteristics. In this paper, we suggested posture analysis algorithm using smartphones to solve the problems related to user's inconvenience and limitation of development according to sensor equipment's characteristics. Also, we developed fall detection system with the suggested algorithm, using hybrid mobile application which is not limited to platform.

Implementation and Analysis of Tunneling Method for Mobile Service (이동 서비스를 위한 터널링 기법의 구현과 성능분석)

  • 천정훈;정진우강현국
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.47-50
    • /
    • 1998
  • In recent years, it is required that computing support mobile user with computer. The advantage of mobile computing is that users may access all their applications from any location, whether they are in another building or a different state. So, Internet combines with mobile computing technology to make new communication environment for supporting mobility. The research for solving the problem of mobility is actively in progress. This paper describes the implementation of tunneling method for flexible bypass between specific region. Tunneling method provide mobile service to mobile hosts. IP datagram's address tranform method is IP-within-IP encapsulation by which an IP datagram may be encapsulated within an IP datagram. The developed IP-within-IP protocol can provide not only enhanced performance because it is implemented in kernel mode, but also convenience of usage to the application developers because it gives user interface as a dynamic link library. Verification of IP packet tunneling was text file transfer program.

  • PDF

K-way Super Node Approach for Guaranteeing User's Global QoS (사용자 전역 QoS를 보장하기 위한 K-way 수퍼 노드 접근법)

  • Kang, Nam-Oh;Park, Sa-Joon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.109-116
    • /
    • 2007
  • Nowadays, with the proliferation of Web services, developer and user can implement a complex application by composing registered Web services. In this trend, the quality of service of a composite Web service is of crucial importance for today's Service Oriented Computing (SOC) environment. But the global optimization of a composite Web service satisfying given QoS is classified to NP-hard problem. To solve this problem, we propose K-way Super node approach and show the effect of it from experimental results.

  • PDF

Security Architecture and Performance Analysis of Air Interface for IMT-2000 Mobile Systems (IMT-2000 이동통신시스템의 보안기능구조 및 무선링크 성능 분석)

  • 권수근
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2001.05a
    • /
    • pp.55-63
    • /
    • 2001
  • IMT-2000 mobile system will serve many application services such as mobile internet, wireless electronics commerce applications using high data rate air interface. These applications require high data integrity, data confidentiality, user authentication, user identity confidentiality and non-repudiation. In this study, we analyze air interface performance fur network access security services in IMT-2000 mobile systems. Signal traffic for network access security services increase all link between IMT-2000 system elements. Our study focus on air interface, which is very sensitive signal traffic increase.

  • PDF

Method of Forewarning Display for Hacking Risk in the Open Wi-Fi (개방형 무료 Wi-Fi의 해킹위험 사전경고 표시)

  • Jeong, Byung-Moon;Lee, Tae-Hee;Lee, Young-Sik;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.6
    • /
    • pp.1143-1150
    • /
    • 2017
  • In this paper, we proposed a method to display a hazard warning of hacking in the UX(: User Experience) concept level for non experts in the open Wi-Fi access area. According to the dangers of the AP raised by capture, we developed an application that provides a warning pop-up on the danger of hacking before using for APs that are distinguished by color and selected.

An Incremental, Iterative and Interative Ontology Matching Approach

  • Wagner, Fernando;Macedo, Jose A.F.;Loscio, Bernadette
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.357-363
    • /
    • 2012
  • Ontologies are being used in order to define common vocabularies to describe the elements of schemas involved in a particular application. The problem of finding correspondences between ontologies concepts, called ontology matching, consists in the discovery of correspondences between terms of vocabularies (represented by ontologies) used by various applications. The majority of solutions proposed in the literature, despite being fully automatic, has heuristic nature and may produce nonsatisfactory results. The problem intensifies when dealing with large data sources. The goal of this paper is to propose a method for generation and incremental refinement of correspondences between ontologies. The proposed approach uses filtering techniques, as well as user feedback to support the generation and refinement of such matches. For validation purposes, a tool was developed and some experiments were conducted.

Augmented Reality Haptic Upper Garment for Wear Sensation (착용감 구현을 위한 증강현실용 햅틱 상의(上衣))

  • Yim, Eunhyuk;Kwon, Jeanne;Lee, Sooyong
    • The Journal of Korea Robotics Society
    • /
    • v.14 no.2
    • /
    • pp.150-156
    • /
    • 2019
  • Haptic systems have been widely used for both virtual reality and augmented reality application including game, entertainment, education and medical sectors. Clothing designers and retailers initiated using AR and VR technologies to help the consumers find style with the perfect fit. Most of the developed augmented reality shopping is implemented by overlapping the image of the clothes on the customer so that he/she can find the fit. However, those are only visual information and the customer cannot experience the real size and the stiffness of the clothes. In this paper, we present the haptic upper garment which provides the haptic feedback to the user using cables. By controlling the length of the cable, the size of the clothes is set and by stiffness control, the compliance of the fabric is implemented. The haptic garment is modeled for precise control and the distributed controller architecture is described. With the haptic upper garment, the user's experience of the virtual clothes is greatly enhanced.

Design and Implementation of Cost-effecive Public Bicycle Sharing System based on IoT and Access Code Distribution (사물 인터넷과 액세스 코드 배포 기반의 경제적인 공공 자전거 공유 시스템의 설계 및 구현)

  • Bajracharya, Larsson;Jeong, Jongmun;Hwang, Mintae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.8
    • /
    • pp.1123-1132
    • /
    • 2018
  • In this paper, we design and implement a public bicycle sharing system based on smart phone application capable of distributing access codes via internet connection. When smartphone user uses the application to request a bicycle unlock code, server receives the request and sends an encrypted code, which is used to unlock the bicycle at the station and the same code is used to return the bicycle. The station's hardware prototypes were built on top of Internet devices such as raspberry pi, arduino, keypad, and motor driver, and smartphone application basically includes shared bike rental and return functionality. It also includes an additional feature of reservation for a certain time period. We tested the implemented system, and found that it is efficient because it shows the average of 3-4 seconds delay. The system can be implemented to manage multiple bikes with a single control box, and as the user can use a smartphone application, this makes the system more cost effective.