• Title/Summary/Keyword: User-defined Model

Search Result 415, Processing Time 0.091 seconds

A Study on the Moderating Effect of Perceived Voluntariness in the Organizational Information System Usage and Performance (정보시스템 사용과 성과에 있어서 자발성의 조절효과에 관한 연구)

  • Lee, Seung-Chang;Lee, Ho-Geun;Jung, Chang-Wook;Chung, Nam-Ho;Suh, Eung-Kyo
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.195-221
    • /
    • 2009
  • According to an industry report, a large number of organizations have invested in Organizational Information System(OIS) in the past few years. Several research results indicate that successful investments in OIS lead to productivity enhancement, while failed ones result in undesirable consequences such as financial losses and dissatisfaction among employees. In spite of huge investments, however, many organizations have failed in achieving the hoped-for returns from OIS. Thus, understanding user acceptance, adoption, and usage of new IS(Information Systems) is an important issue for IS practitioners. Indeed, study of the user acceptance of new information system has been one of the most important research topics in the contemporary IS literature. Several theoretical models are tested to examine 'user acceptance' and 'usage behavior' in IS context. While many research models incorporate 'ease of use' or 'usefulness' as important factors in explaining user acceptance, Technology Acceptance Model(TAM) has been one of the most widely applied models in user acceptance and usage behavior. Even in recent IS studies that employ theories of innovation diffusion in the area of IS implementation, a major focus has been on the user's perception of information technologies. In this research, we study 'voluntariness' as an important factor in IS acceptance by users. Voluntariness is defined as "the degree to which the use of the innovation is perceived as being voluntary, or of free will" When examining the diffusion of accepting OIS, a thoughtful consideration should be given to 'perceived voluntariness.' Current article has following research questions: 1) What models are appropriate to explain the success of OIS? and 2) How does the 'voluntariness' affect the success of OIS? In order to answer these questions, a research model is proposed to describe the detailed nature of association among three independent variables (IT usage level, task interdependency, and organizational support), a mediating variable (IS usage), a dependent variable (perceived performance), and a moderating variable(perceived voluntariness). The central claim of this article is that organizations hardly realize expected returns from OIS investments unless perceived voluntariness is effectively managed after operating OIS. As an example of OIS in this study we have selected the Intranet of Republic of Korea Air Force (ROKAF). ROKAF has implemented the Intranet in an attempt to improve communication and coordination within the organization. To test our research model and hypotheses, survey questionnaires were first sent out to 400 Intranet users. With the assistance of ROKAF, Intranet users were initially identified among its members, and subjects were randomly drawn from the pool. 377 survey responses were finally returned. The unit of measurement and analysis in this research is a personal level. Path analysis based on structural equation modeling was used to test research hypotheses. Construct validity represents accordance between the theoretical base concept of constructs and its measurement items. Tests for the reliability and discriminant validity are accepted, thus verifying our survey instrument. In this research, we have proposed a conceptual framework to highlight the importance of perceived voluntariness after organization deploys OIS. The results of our analysis present several key finding. First, all three independent variables (IT usage level, task interdependency, and organizational support) have significant effects on IS usage, which will eventually improve performance. Thus, IS usage plays a mediating role between antecedent variables (IT usage level. task interdependency, and organizational support) and performance improvement. Second, the effect of the task dependency was the highest for IS usage among the three antecedent variables. This is highly plausible since one of the Intranet's major capabilities is to facilitate communication among members within an organization. Accordingly, we conclude that the higher the task dependency, the higher Intranet usage. The effect of user's IT usage level was the second, while the effect of the organizational support was the third. Finally, the perceived voluntariness plays a pivotal role in enhancing perceived performance in personal level after launching the Intranet. Relationships among investigated variables were significantly different between groups with a high level and a low level of voluntariness. The impact of the Intranet usage on the performance was greater in the higher level voluntariness group than in the lower one. For the lower level voluntariness group, the user's IT usage had the highest effect on the Intranet usage among the three antecedent variables. In short, our study suggests that the higher the perceived voluntariness is the more IS usage will be. Perceived voluntariness was found to have a moderating effect on the relationships among user IT usage level, task interdependency, IS usage, and perceived performance, supporting all the hypotheses on the moderating effect. Most of all, user IT usage level has the strongest influence on IS usage, indicating that users with superior IT usage are more likely to enjoy a high level of perceived performance.

Protection of Personal Information on Cloud Service Models (클라우드 서비스 유형별 개인정보보호 방안)

  • Lee, Bosung;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1245-1255
    • /
    • 2015
  • As cloud computing services become popular, the concern on the data security of cloud services increases and the efforts for the data security become essential. In this paper, we describe the pros and cons of cloud computing including the definition of cloud. Then, we discuss the regulations about the protection of user data defined in cloud promotion act. Previous studies related to the privacy protection and the entrustment of personal information in cloud computing are reviewed. We examine how to store the personal information depending on the cloud service model. As a result, we argue that the entrustment of personal information should vary according to the cloud service model and we propose how to protect the personal information on IaaS and SaaS cloud service models.

HUMAN INTERFACE TO MULTIMEDIA DATABASE SYSTEMS

  • Higuchi, Kazugide;Tada, Masahiro;Ogino, Akihiro;Sato, Ayumi;Yano, Emi;Kobayashi, Hayato;Kato, Toshikazu
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2002.05a
    • /
    • pp.274-277
    • /
    • 2002
  • To transmit users' intentions that vary with each person, intuitive and hi-directional interactions between users and a computer are necessary. We considered these interactions by dividing them into two spaces, physical space and informational space. Informational space supports human thinking process by arranging and visualizing much information. Physical space reproduces the real world where various restrictions exist to virtual space. From the viewpoint of three aspects - contents model, kansei model and context model - we defined the style of the interaction between user and multimedia database. In this paper, for the purpose of examining the way to realize the interaction based on these models, we developed interior design coordination support system and garden coordination system, and then evaluated them.

  • PDF

A Factor Analysis for the Successful Implementation of Digital Manufacturing Using Extended Technology Acceptance Model (ETAM) (확장기술수용모형(ETAM)을 이용한 디지털 매뉴팩처링의 성공적 도입에 영향을 주는 요인 분석)

  • Jeong, Sei-Hyun;Moon, Dug-Hee;Park, Hee-Chang
    • IE interfaces
    • /
    • v.19 no.3
    • /
    • pp.255-269
    • /
    • 2006
  • Digital manufacturing(DM) is the ability to describe every aspect of the design-to-manufacture process digitally-using tools that include digital design, CAD, office documents, PLM(Product Life-cycle Management) systems, analysis software, simulation, CAM software and so on. The major automotive companies are already deeply invested in DM with almost every process being digital rather than paper-based. But it has taken a long time for the digital process to mature into something usable and there have been some major barriers that have prevented from the DM becoming a reality. Thus many companies hesitate to make a decision of implementing the DM. This paper deals with a study investigating which factors are important for implementing the DM to industries successfully. The extended technology acceptance model (ETAM) is used as the relation model of cause and effect. The quality of hardware, the quality of software, the range of collaboration among companies and the preference of the user are defined as the external factors. Interview method is used for gathering input data, and the results are analyzed with SPSS. The results indicate that four external factors are effective on the successful implementation of DM, and the perceived usefulness is most important.

A Study on the Factors Affecting Mobile Commerce User' Post-Adoptive Behavior (모바일 커머스 수용 후 행동에 관한 연구)

  • Jo, Dong Hyuk;Park, Jong Woo
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.163-182
    • /
    • 2015
  • The spread of mobile commerce due to popularization of smartphones not only broke down the boundary between online and offline, but also changed the consumer life, and hence brought change of commerce paradigm that creates new demand. The success of innovative information technology such as mobile shopping can be defined as an individual accepting the technology and continuously using it, but the studies on the usage behavior after the acceptance have been done in very restrictively, despite its importance. In this study, in order to empirically investigate the factors that influence the continuance in mobile shopping usage experience and its causal relationship, Social Cognitive Theory and Habit Theory were applied to IS Continuance Model, and the extended IS Continuance Model was suggested and proved. As a result, the usefulness, enjoyment, and self-efficacy perceived in usage experience significantly influence satisfaction, and usefulness, self-efficacy, and satisfaction influence habit. Also, usefulness, self-efficacy, satisfaction, and habit significantly influence continuance intention. This study provides a valuable asset in providing an opportunity to understand the usage behavior of mobile shopping service users after the acceptance, and furthermore proving directionality in improving customer loyalty.

2D-3D Pose Estimation using Multi-view Object Co-segmentation (다시점 객체 공분할을 이용한 2D-3D 물체 자세 추정)

  • Kim, Seong-heum;Bok, Yunsu;Kweon, In So
    • The Journal of Korea Robotics Society
    • /
    • v.12 no.1
    • /
    • pp.33-41
    • /
    • 2017
  • We present a region-based approach for accurate pose estimation of small mechanical components. Our algorithm consists of two key phases: Multi-view object co-segmentation and pose estimation. In the first phase, we explain an automatic method to extract binary masks of a target object captured from multiple viewpoints. For initialization, we assume the target object is bounded by the convex volume of interest defined by a few user inputs. The co-segmented target object shares the same geometric representation in space, and has distinctive color models from those of the backgrounds. In the second phase, we retrieve a 3D model instance with correct upright orientation, and estimate a relative pose of the object observed from images. Our energy function, combining region and boundary terms for the proposed measures, maximizes the overlapping regions and boundaries between the multi-view co-segmentations and projected masks of the reference model. Based on high-quality co-segmentations consistent across all different viewpoints, our final results are accurate model indices and pose parameters of the extracted object. We demonstrate the effectiveness of the proposed method using various examples.

Numerical modeling of the damaged cement orthopedic in three variants of total hip prostheses

  • Cherfi Mohamed;Zagane Mohammed El Sallah;Moulgada Abdelmadjid;Ait Kaci Djafar;Benouis Ali;Zahi Rachid;Sahli Abderahmen
    • Structural Engineering and Mechanics
    • /
    • v.91 no.3
    • /
    • pp.251-262
    • /
    • 2024
  • Numerical modeling using the finite element method (FEM) offers crucial insights into the mechanical behavior of prostheses, including stress and strain distribution, load transfer, and stress intensity factors. Analyzing cracking in PMMA surgical cement (polymethylmethacrylate) for total hip prostheses (THP) is essential for understanding the loosening phenomenon, as the rupture of orthopedic cement is a primary cause. By understanding various failure mechanisms, significant advancements in cemented total prostheses can be achieved. This study performed a numerical analysis using a 3D FEM model to evaluate stress levels in different THP models, aiming to model damage in the orthopedic cement used in total hip arthroplasty. Utilizing ABAQUS software, FEM, and XFEM, the damage in three types of THPs-Charnley (CMK3), Osteal (BM3), and THOMPSON was modeled under stumbling loading conditions. XFEM allowed for the consideration of crack propagation between the cement and bone, while the GEARING criterion employed a user-defined field subroutine to model damage parameters. The study's findings can contribute to improving implant fixation techniques and preventing postoperative complications in orthopedic surgery.

Non-linear tensile behavior of high manganese steel based on elasto-plastic damage model (탄-소성 손상모델을 활용한 고망간강의 인장거동 모사에 관한 연구)

  • Kim, Jong-Hwan;Lee, Jeong-Ho;Kim, Seul-Kee;Chun, Min-Sung;Lee, Jae-Myung
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.41 no.3
    • /
    • pp.222-229
    • /
    • 2017
  • High manganese steel exhibits excellent mechanical properties with respect to strength and durability at low temperatures. Recently, high manganese steel has been considered as an alternative to existing materials, such as nickel steel and SUS304L for application as tank material for Liquefied Natural Gas (LNG) cargo containment systems. In the present study, tensile tests were performed at room and cryogenic temperatures in order to investigate the mechanical properties and non-linear tensile behavior of high manganese steel. In addition, elasto-plastic damage model was applied using the finite element analysis software ABAQUS via a user defined material subroutine (UMAT) to describe the material behavior. Finally, the results of the finite element simulations using the UMAT were compared to those of the tensile tests in order to validate the proposed UMAT. It has been demonstrated that the UMAT can effectively describe the non-linear tensile behavior of high manganese steel.

Design of the Advanced Mobile Teletraffic Model and Object Classes for Mobile Simulator (이동통신 시뮬레이터를 위한 개선된 텔레트래픽 모델과 객체 클래스 설계)

  • Yoon, Young-Hyun;Kim, Sang-Bok;Lee, Jeong-Bae;Lee, Sung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.509-518
    • /
    • 2004
  • Many simulators have been developed and are being used for the complex and various mobile communication service environments. Each of these simulators has its own teletraffic model that consists of traffic source model and network traffic model. In this paper, network traffic model and traffic source model, which are based on the data gathered in real environment, are defined in order to get more accurate simulation results in the mobile communication simulation for the urban region. The network traffic model suggested in this paper reflects the hourly call generation rate and call duration time by analyzing the data collected from actually installed base station by the time and place, and the traffic source model includes the delivery share ratio and average speed information in the region where the base station is installed. This paper defined and designed Mobile Host object that reflects the suggested traffic source model, and Call Generator object that reflects the network traffic model, and other objects support both objects. Using the teletraffic model suggested in the paper, user mobility similar to real service environment and traffic characteristics can be reflected on the simulation, and also more accurate simulation results can be got through that. In addition, by using object-oriented techniques, new service feature or environment can be easily added or changed so that the developed mobile communication simulator can reflect the real service environment all the time.

Analysis on the creep response of bolted rock using bolted burgers model

  • Zhao, Tong-Bin;Zhang, Yu-Bao;Zhang, Qian-Qing;Tan, Yun-Liang
    • Geomechanics and Engineering
    • /
    • v.14 no.2
    • /
    • pp.141-149
    • /
    • 2018
  • In this paper, the creep behavior of bolted rock was analyzed by using the unconfined creep tests and the numerical results. Based on the test results, the Bolted Burgers creep model (B-B model) was proposed to clarify the creep mechanism of rock mass due to rock bolts. As to the simulation of the creep behaviour of bolted rock, a new user-defined incremental iterative format of the B-B model was established and the open-source $FLAC^{3D}$ code was written by using the object-oriented language (C++). To check the reliability of the present B-B creep constitutive model program, a numerical model of a tunnel with buried depth of 1000 m was established to analyze the creep response of the tunnel with the B-B model support, the non-support and the bolt element support. The simulation results show that the present B-B model is consistent with the calculated results of the inherent bolt element in $FLAC^{3D}$, and the convergence deformation can be more effectively controlled when the proposed B-B model is used in the $FLAC^{3D}$ software. The big advantage of the present B-B creep model secondarily developed in the $FLAC^{3D}$ software is the high computational efficiency.