• Title/Summary/Keyword: User perception

Search Result 696, Processing Time 0.027 seconds

Understanding Brand Image from Consumer-generated Hashtags

  • Park, Keeyeon Ki-cheon;Kim, Hye-jin
    • Asia Marketing Journal
    • /
    • v.22 no.3
    • /
    • pp.71-85
    • /
    • 2020
  • Social media has emerged as a major hub of engagement between brands and consumers in recent years, and allows user-generated content to serve as a powerful means of encouraging communication between the sides. However, it is challenging to negotiate user-generated content owing to its lack of structure and the enormous amount generated. This study focuses on the hashtag, a metadata tag that reflects customers' brand perception through social media platforms. Online users share their knowledge and impressions using a wide variety of hashtags. We examine hashtags that co-occur with particular branded hashtags on the social media platform, Instagram, to derive insights about brand perception. We apply text mining technology and network analysis to identify the perceptions of brand images among consumers on the site, where this helps distinguish among the diverse personalities of the brands. This study contributes to highlighting the value of hashtags in constructing brand personality in the context of online marketing.

Design of protocol for RFID/USN security (RFID/USN 보안을 위한 프로토콜 설계)

  • Park, Sang-Hyun;Park, Sang-Min;Shin, Seung-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.3
    • /
    • pp.103-109
    • /
    • 2007
  • Payment and security requirement are playing an increasingly critical role in RFID system, allegedly the core of the ubiquitous, especially in logistics. Therefore, security technology has been playing essential role gradually unlike the past when only the perception of equipment was considered important technology. The current encoding system allows the access only to the user who has the secret key. Many encoding algorithm has been studied to ensure the security of secret key. Security protocol is the most typical way to authorize appropriate user perception by using the data and secret key to proceed the encoding and transmit it to the system in order to confirm the user. However, RFID system which transmits more than dozens of data per second cannot be used if the algorithm and protocol of the existing wired system are used because the performance will degrade as a consequence. Security protocol needs to be designed in consideration of property of RFID and hardware. In this paper, a protocol was designed using SNEP(Sensor Network Encryption Protocol), the security protocol used for the sensor similar to RFID- not the current system used in wired environment- and ECC (Elliptic Curve Cryptography: oval curve encoding), the encoding algorithm.

Research on the Continuous Use Intention of Mobile Bus Payment App from the Perspective of user Quality Perception

  • Li, Shuo;Sun, Cong-Ying
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.217-224
    • /
    • 2022
  • Based on the success model and Expectation Confirmation model of information system, the concept model of mobile bus payment App users' willingness to continue using is constructed by introducing function quality and interface design quality. A total of 264 valid questionnaires are obtained by issuing online questionnaires, and the model is tested by SmartPLS3.0 software The results show that users' perceptions of information quality, system quality and interface design quality will affect users' perceived usefulness and satisfaction through the scene, and then affect users' willingness to continue to use; Perceived functional quality has a significant impact on perceived usefulness, but has no significant impact on satisfaction. Perceived usefulness has a significant impact on user satisfaction.

Research on UAV access deployment algorithm based on improved virtual force model

  • Zhang, Shuchang;Wu, Duanpo;Jiang, Lurong;Jin, Xinyu;Cen, Shuwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2606-2626
    • /
    • 2022
  • In this paper, a unmanned aerial vehicle (UAV) access deployment algorithm is proposed, which is based on an improved virtual force model to solve the poor coverage quality of UAVs caused by limited number of UAVs and random mobility of users in the deployment process of UAV base station. First, the UAV-adapted Harris Hawks optimization (U-AHHO) algorithm is proposed to maximize the coverage of users in a given hotspot. Then, a virtual force improvement model based on user perception (UP-VFIM) is constructed to sense the mobile trend of mobile users. Finally, a UAV motion algorithm based on multi-virtual force sharing (U-MVFS) is proposed to improve the ability of UAVs to perceive the moving trend of user equipments (UEs). The UAV independently controls its movement and provides follow-up services for mobile UEs in the hotspot by computing the virtual force it receives over a specific period. Simulation results show that compared with the greedy-grid algorithm with different spacing, the average service rate of UEs of the U-AHHO algorithm is increased by 2.6% to 35.3% on average. Compared with the baseline scheme, using UP-VFIM and U-MVFS algorithms at the same time increases the average of 34.5% to 67.9% and 9.82% to 43.62% under different UE numbers and moving speeds, respectively.

Information Security on Learning Management System Platform from the Perspective of the User during the COVID-19 Pandemic

  • Mujiono, Sadikin;Rakhmat, Purnomo;Rafika, Sari;Dyah Ayu Nabilla, Ariswanto;Juanda, Wijaya;Lydia, Vintari
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.1
    • /
    • pp.32-44
    • /
    • 2023
  • Information security breach is a major risk in e-learning. This study presents the potential information security disruptions in Learning Management Systems (LMS) from the perspective of users. We use the Technology Acceptance Model approach as a user perception model of information security, and the results of a questionnaire comprising 44 questions for instructors and students across Indonesia to verify the model. The results of the data analysis and model testing reveals that lecturers and students perceive the level of information security in the LMS differently. In general, the information security aspects of LMSs affect the perceptions of trust of student users, whereas such a correlation is not found among lecturers. In addition, lecturers perceive information security aspect on Moodle is and Google Classroom differently. Based on this finding, we recommend that institutions make more intense efforts to increase awareness of information security and to run different information security programs.

Exploring the Performance of Deep Learning-Driven Neuroscience Mining in Predicting CAUP (Consumer's Attractiveness/Usefulness Perception): Emphasis on Dark vs Light UI Modes (딥러닝 기반 뉴로사이언스 마이닝 기법을 이용한 고객 매력/유용성 인지 (CAUP) 예측 성능에 관한 탐색적 연구: Dark vs Light 사용자 인터페이스 (UI)를 중심으로)

  • Kim, Min Gyeong;Costello, Francis Joseph;Lee, Kun Chang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.19-22
    • /
    • 2022
  • In this work, we studied consumers' attractiveness/usefulness perceptions (CAUP) of online commerce product photos when exposed to alternative dark/light user interface (UI) modes. We analyzed time-series EEG data from 31 individuals and performed neuroscience mining (NSM) to ascertain (a) how the CAUP of products differs among UI modes; and (b) which deep learning model provides the most accurate assessment of such neuroscience mining (NSM) business difficulties. The dark UI style increased the CAUP of the products displayed and was predicted with the greatest accuracy using a unique EEG power spectra separated wave brainwave 2D-ConvLSTM model. Then, using relative importance analysis, we used this model to determine the most relevant power spectra. Our findings are considered to contribute to the discovery of objective truths about online customers' reactions to various user interface modes used by various online marketplaces that cannot be uncovered through more traditional research approaches like as surveys.

  • PDF

A Study on User Perception of Tourism Platform Using Big Data

  • Se-won Jeon;Sung-Woo Park;Youn Ju Ahn;Gi-Hwan Ryu
    • International journal of advanced smart convergence
    • /
    • v.13 no.1
    • /
    • pp.108-113
    • /
    • 2024
  • The purpose of this study is to analyze user perceptions of tourism platforms through big data. Data were collected from Naver, Daum, and Google as big data analysis channels. Using semantic network analysis with the keyword 'tourism platform,' a total of 29,265 words were collected. The collection period was set for two years, from August 31, 2021, to August 31, 2023. Keywords were analyzed for connected networks using TexTom and Ucinet programs for social network analysis. Keywords perceived by tourism platform users include 'travel,' 'diverse,' 'online,' 'service,' 'tourists,' 'reservation,' 'provision,' and 'region.' CONCOR analysis revealed four groups: 'platform information,' 'tourism information and products,' 'activation strategies for tourism platforms,' and 'tourism destination market.' This study aims to expand and activate services that meet the needs and preferences of users in the tourism field, as well as platforms tailored to the changing market, based on user perception, current status, and trend data on tourism platforms.

A Study on the Perception of Airline Non-Face-to-Face Boarding Service among Chinese Travelers (중국 여행객의 항공사 비대면 탑승수속 서비스에 대한 인식 연구)

  • Xin Shu Jiang;Young Woo Lee
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.32 no.2
    • /
    • pp.124-134
    • /
    • 2024
  • This study is based on the Expectation Confirmation Theory (ECT) and categorizes trust types in non-face-to-face boarding services into three dimensions: structural assurance, platform, and service provider. It analyzes the impact of these trust types on users' perceived usefulness, satisfaction, and continuous usage intentions. Using a structural equation model, the study found that the three dimensions of trust positively influence users' satisfaction and perception of usefulness, thereby promoting intentions for continuous use. However, perceived risk weakens the positive relationship between trust and continuous usage intentions. By exploring the moderating role of perceived risk in non-face-to-face boarding services, this study analyzes its impact on user behavior patterns, contributing to the optimization of service design and enhancement of user trust. This study promotes widespread acceptance and continuous use of the service, and is crucial for developing effective non-contact service strategies that meet the needs and expectations of Chinese travelers in the post-pandemic travel environment. The findings provide a new perspective and empirical evidence for understanding user attitudes and behaviors towards non-face-to-face services, holding significant theoretical and practical implications.

Factors Influencing Online Shopping Intention: An Empirical Study in Vietnam

  • HA, Ngoc Thang;NGUYEN, Thi Lien Huong;PHAM, Thanh Van;NGUYEN, Thi Hong Tham
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.3
    • /
    • pp.1257-1266
    • /
    • 2021
  • The study examines factors that influence shopping intention of online consumers in Vietnam. Studied factors include consumers' attitude, subjective norms, perception of behavioral control, perception of usefulness, perceived risks and trust. The expansion of Theory of Planned Behavior (TPB) and Technology Acceptance Model (TAM) are used as basic theories. We have surveyed people who have experiences on online shopping. There are 836 selected questionnaires that are qualified for data processing. The collected data are analyzed through a process which starts from scale reliability test to exploratory factor analysis (EFA), correlation analysis and regression analysis. The results show that shopping intention of online consumers are positively affected by their attitude, subjective norms, perception of behavioral control, perception of usefulness and trust. In contrast, online shopping intention is negatively affected by the perceived risks that online shopping could bring. Among those factors, the perception of risk is shown to have the strongest influence to online shopping intention. The findings of this study suggest that managers and retailers can apply cash-on-delivery method and design their website with user-friendly interface to enhance online shopping intention of consumers. The Government is also recommended to fulfill the law system to reduce customers' perception of financial risks.

Study on Users' Perception of the Effectiveness of Theme Collections in Public Libraries (공공도서관 테마 컬렉션 효과에 대한 이용자 인식 연구)

  • Baek, Ji-Won;Pyo, Soon Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.54 no.3
    • /
    • pp.115-139
    • /
    • 2020
  • The purpose of this study is to evaluate the effectiveness of the theme collection service in public library from the user's perspective. To this end, based on prior research, the effect elements of the theme collection were derived from the service use, librarian, and library level. A questionnaire survey was conducted on 294 users of A public library. The collection satisfaction of users who know the theme collection was higher than those who did not, and showed high recognition for the satisfaction with the use of new and unexpected books. In addition, it was found that the positive recognition tended to be high among users who have been using the library for a long time and frequently use the library service. Based on the users' perception and evaluation of the theme collection, the direction of development of the theme collection service was suggested in terms of collection development, collection use and information service, user-centered classification, and awareness improvement of libraries and librarians.