• Title/Summary/Keyword: User Information Needs

Search Result 1,266, Processing Time 0.035 seconds

Analysis of Electronic Book User Needs through Fuzzy AHP & Conjoint Analysis (퍼지 계층적 의사결정 기법과 컨조인트 분석을 활용한 국내 전자책 이용그룹의 요구수준 분석)

  • Yoon, Su-Jin;Jung, Ho-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.205-214
    • /
    • 2011
  • With the success of Kindle, an electronic book reader developed by Amazon.com, there has been a growing interest in both electronic books and readers in Korea. In this paper, we analyze electronic book user needs through fuzzy analytic hierarchy process (AHP) and conjoint analysis. First, we select the important factors which can affect the intention to purchase electronic book readers by applying the fuzzy AHP with the help of electronic book experts. Next, we perform conjoint analysis to reveal the detailed needs of electronic book users for each of the selected factors. Some useful implications and research limitations are also presented with future research directions.

Development of Dynamic Vehicle Service Simulation Tool based on Node-RED (Node-RED 기반 동적 차량 서비스 시뮬레이션 툴 개발)

  • Ryu, Minwoo;Lee, Jongeon;Cha, Si-Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.4
    • /
    • pp.77-83
    • /
    • 2022
  • As users' needs for customized services increase, the service provision method is changing from a vertical structural service provision method to a horizontal structural service provision method. This paradigm shift has led to a change from the way existing users find the content they want to find and provide customized needs of users by content providers. With the recent development of smartphones and various AI technologies, demand for providing seamless services such as smartphones is increasing in automobiles. However, it is difficult to provide services in line with changes in this service paradigm because automobile services provide services centered on finished car manufacturers rather than individually providing services tailored to user needs. In this paper, we develop a Node-RED-based dynamic vehicle service simulation tool so that users can use the service they want in cars. The simulation tool developed provides a simulation environment for services authored by the user using NodeRed by writing, registering, and using NodeRed.

A Representation Model for Reusable Assets To Support User Context

  • Hadji, Hend Ben;Choi, Ho-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06a
    • /
    • pp.55-59
    • /
    • 2008
  • In the field of software reuse, several methods for storage and retrieval of assets abound. However, these methods often find their limits; they fail to turn up the suitable reusable assets that satisfy the needs of a particular software system under development. Two problems are the root cause of this situation. One is the lack of accurate semantics for describing software assets. The other is the ignorance of the user query context. In such a context, this paper presents an XML-based asset representation model for describing all kinds of software asset that can be reused within software development process. The proposed model provides semantic metadata for describing assets oriented user context in order to build the foundation for semantic reasoning in the retrieval process.

  • PDF

A Comparative Study of Evaluation Factors on Information Systems between the User and the Developer (정보시스템 개발자와 이용자 간의 평가요소에 대한 비교 연구)

  • 조현양
    • Journal of the Korean Society for information Management
    • /
    • v.13 no.1
    • /
    • pp.143-172
    • /
    • 1996
  • The purpose of the study is to set up factors for evaluating information systems which can meet both users' and developers' needs. These factors can be used as a framework in developing successful information systems. To achieve this purpose factors are selected first from the literature review by the previous studies. Then two different questionnaires based on selected factors were made up and distributed to two separate groups; users and developers. It appeared that there are significant differences on ranking and weighting for evaluation factors of information systems between the user and the developer. 185 factors for evaluating information systems are divided into 9 criteria based on their roles. There are significant differences on ranking under 6 out of 9 evaluation criteria between two groups. These are 'effectiveness', 'usability', 'user friendliness', 'documentation', 'output', 'maintenance'. However, there are no significant differences on factors in 'performance', 'developer', and 'user satisfaction' criteria. As a result of the study 185 factors for evaluating information systems were presented with rank.

  • PDF

A Design and Implementation of Needs Analysis System in Internet Shopping Mall (인터넷 쇼핑몰 니즈 분석 시스템의 설계 및 구현)

  • Park, Sung-hoon;Kim, Jindeog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2073-2080
    • /
    • 2015
  • Even though users choose goods they want to buy in on-line shopping malls, real purchase is often performed in off-line shopping malls. It is called reverse showrooming. It means that users' analysis of goods based on images and description of internet shopping malls has limitation. Thus, large-scale online shopping malls provide a customized shopping information. However, in that case, the provided information is a simple list of goods users bought or retrieved. Thus, a system to analyze various needs of users and apply the result into on-line shopping mall is necessary. In this paper, an analysis system is proposed. The system contains a module to analyze user defined preference and a module to analyze users' reviews. The former designates two goods and collects preferences of individual users. the latter analyzes reviews about purchased goods based on database dictionary stored in advance for analyzing reviews. The system implemented shows that it is possible to recommend some goods that meet each users's needs

A Study on the Value Evaluation of e-Trade Platform Services using IPA(Importance Performance Analysis) (IPA를 활용한 전자무역 시스템의 서비스 가치평가에 관한 연구)

  • Lee, Sang-Jin;Shin, Seung-Man
    • International Commerce and Information Review
    • /
    • v.12 no.2
    • /
    • pp.59-83
    • /
    • 2010
  • The purposes of the study is to evaluate the discrepancy between user's expectation and satisfaction degree in the service of uTradeHub. In this regard, this study infers general solutions in order to induce the intersection area using IPA technique. Then this paper will present directions to improve the service of uTradeHub. In terms of methodology, this article disclosed that IPA model approach is greatly useful to evaluate user's attribute. First, variables like the link of different works(f1), trust of system(f4), information connection(f7) are located on the first quadrant. This means that importance and satisfaction are all high variables for user. So, this is very important variables that need continuous administration in order to maintain present state. Second, variables such as the speed of information acquisition(f2), improvement of use(f3), stability of system(f5) are located on the second quadrant. This means that user's importance is high but user's satisfaction is low. Therefore, this area needs an active improvement strategy and quick maintenance for e-Trade application. Third, variables like the appropriateness of information usage fees(f8), easy subscription(f9), customer support service(f10) are located on the third quadrant. Because these variables are all low for user's importance and satisfaction, we have to arrange strong and radical remedy for e-Trade service. Finally, variables like information offer(f6) are located on the fourth quadrant. This means that user's satisfaction is high but user's importance is low. The research result suggests that e-Trade service development would be re-organised as much as user feels the importance of process innovation.

  • PDF

Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol

  • Wei, Guiyi;Yang, Xianbo;Shao, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3352-3365
    • /
    • 2012
  • Group key agreement (GKA) is a cryptographic primitive allowing two or more users to negotiate a shared session key over public networks. Wu et al. recently introduced the concept of asymmetric GKA that allows a group of users to negotiate a common public key, while each user only needs to hold his/her respective private key. However, Wu et al.'s protocol can not resist active attacks, such as fabrication. To solve this problem, Zhang et al. proposed an authenticated asymmetric GKA protocol, where each user is authenticated during the negotiation process, so it can resist active attacks. Whereas, Zhang et al.'s protocol needs a partially trusted certificate authority to issue certificates, which brings a heavy certificate management burden. To eliminate such cost, Zhang et al. constructed another protocol in identity-based setting. Unfortunately, it suffers from the so-called key escrow problem. In this paper, we propose the certificateless authenticated asymmetric group key agreement protocol which does not have certificate management burden and key escrow problem. Besides, our protocol achieves known-key security, unknown key-share security, key-compromise impersonation security, and key control security. Our simulation based on the pairing-based cryptography (PBC) library shows that this protocol is efficient and practical.

Exploring Student Engagement on Library Facebook Pages: A Survey of Vietnamese Academic Libraries

  • Chi, Duong Thi Phuong
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.2
    • /
    • pp.17-29
    • /
    • 2022
  • Facebook is very popular among young people and especially university students. Therefore, Facebook is the most logical platform to be used by academic libraries for promotional purposes and reaching out to user communities. This study aims to measure the effectiveness of using Facebook in connecting with students in academic libraries. A questionnaire survey was conducted to collect research data from students at four Vietnamese universities. A total of 1,670 valid questionnaires were returned, and more than half of the respondents were females between the ages of 18 and 22 years. The survey results found that libraries' Facebook pages did not receive adequate attention and interaction from students. Besides that, the information needs of students and social media content in general affected student acceptance of libraries' Facebook pages. These factors are demonstrated by the great majority of students who used Facebook often for various purposes, but fewer accessed library pages and they were not actively engaged in library posts. Students were interested in the information they already tended to get from libraries and were optimistic about the quality of library posts. However, they still expected more diverse and attractive content from the libraries. The findings of this study can help libraries create a close connection with students by satisfying their needs and expectations on Facebook.

Joint Spectrum and Power Allocation for Green D2D Communication with Physical Layer Security Consideration

  • Chen, Hualiang;Cai, Yueming;Wu, Dan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1057-1073
    • /
    • 2015
  • In this paper, we consider cooperative D2D communications in cellular networks. More precisely, a cellular user leases part of its spectrum to facilitate the D2D communication with a goal of improving the energy efficiency of a D2D pair. However the D2D pair is untrusted to the cellular user, such resource sharing may result in the information of this cellular user unsecured. In order to motivate the cellular user's generosity, this D2D pair needs to help the cellular user maintain a target secrecy rate. To address this issue, we formulate a joint spectrum and power allocation problem to maximize the energy efficiency of the D2D communication while guaranteeing the physical layer security of the cellular user. Then, a theorem is proved to indicate the best resource allocation strategy, and accordingly, an algorithm is proposed to find the best solution to this resource allocation problem. Numerical results are finally presented to verify the validity and effectiveness of the proposed algorithm.

Dynamic Selection of Candidate Device for the Seamless Service Using User Location Prediction (세션 모빌리티를 위한 사용자 위치 예측 통한 동적 후보 장치 선택)

  • Jung, E.-Gun;Lee, Seung-Hoon;Kim, Sang-Wook
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.510-516
    • /
    • 2008
  • In ubiquitous environment, there are no limits to utilize networks whenever and wherever you are. That pervasive networks are combined with the information devices and then create various services such as car navigation of LBS(location based service) and DMB(Digital Multimedia Broadcasting). As these kinds of services are getting more various, the complexity is also getting higher and ultimately the convergence will make people feel frustrated. One of the solutions is Context-Awareness[1] technology. User interface with context-awareness filters unnecessary information and prevents users from being blocked due to the massive information. In this paper, we describe the seamless service system based on location-awareness, which is a type of context-awareness. We developed the system based on UPnP AV Framework. This system provides the automatic terminal device selection for the nomadic user. The system establishes new connections for the ongoing streaming playback session with the new AV devices without substantial loss of playback so that the user can enjoy the seamless service. The AV device selection based on the user's location needs no user's intervention or notification so it achieves the improvement of usability and complexity.

  • PDF