• Title/Summary/Keyword: Users' Interactions

Search Result 346, Processing Time 0.027 seconds

Generic Costing Scheme Using General Equilibrium Theory for Fair Cloud Service Charging

  • Hussin, Masnida;Jalal, Siti Fajar;Latip, Rohaya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.58-73
    • /
    • 2021
  • Cloud Service Providers (CSPs) enable their users to access Cloud computing and storage services from anywhere in quick and flexible manners through the Internet. With the basis of 'pay-as-you-go' model, it makes the interactions between CSPs and the users play a vital role in shaping the Cloud computing market. A pool of virtualized and dynamically scalable Cloud services that delivered on demand to the users is associated with guaranteed performance and cost-provisioning. It needed a costing scheme for determining suitable charges in order to secure lease pricing of the Cloud services. However, it is hard to meet the satisfied prices for both CSPs and users due to their conflicting needs. Furthermore, there is lack of Service Level Agreements (SLAs) that allowing the users to take part into price negotiating process. The users may lose their interest to use Cloud services while reducing CSPs profit. Therefore, this paper proposes a generic costing scheme for Cloud services using General Equilibrium Theory (GET). GET helps to formulate the price function for various services' factors to match with various demands from the users. It is initially determined by identifying the market circumstances that a general equilibrium will be hold and reached. Specifically, there are two procedures of agreement made in response to (i) established equilibrium supply and demand, and (ii) service price formed and constructed in a price range. The SLAs in our costing scheme is integrated to satisfy both CSPs and users' needs while minimizing their conflicts. The price ranging strategy is deliberated to provide prices' options to the users with respect their budget limit. Meanwhile, the CSPs can adaptively charge based on users' preferences without losing their profit. The costing scheme is testable and analyzed in multi-tenant computing environments. The results from our simulation experiments demonstrate that the proposed costing scheme provides better users' satisfaction while fostering fairness pricing in the Cloud market.

Users' Attachment Styles and ChatGPT Interaction: Revealing Insights into User Experiences

  • I-Tsen Hsieh;Chang-Hoon Oh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.3
    • /
    • pp.21-41
    • /
    • 2024
  • This study explores the relationship between users' attachment styles and their interactions with ChatGPT (Chat Generative Pre-trained Transformer), an advanced language model developed by OpenAI. As artificial intelligence (AI) becomes increasingly integrated into everyday life, it is essential to understand how individuals with different attachment styles engage with AI chatbots in order to build a better user experience that meets specific user needs and interacts with users in the most ideal way. Grounded in attachment theory from psychology, we are exploring the influence of attachment style on users' interaction with ChatGPT, bridging a significant gap in understanding human-AI interaction. Contrary to expectations, attachment styles did not have a significant impact on ChatGPT usage or reasons for engagement. Regardless of their attachment styles, hesitated to fully trust ChatGPT with critical information, emphasizing the need to address trust issues in AI systems. Additionally, this study uncovers complex patterns of attachment styles, demonstrating their influence on interaction patterns between users and ChatGPT. By focusing on the distinctive dynamics between users and ChatGPT, our aim is to uncover how attachment styles influence these interactions, guiding the development of AI chatbots for personalized user experiences. The introduction of the Perceived Partner Responsiveness Scale serves as a valuable tool to evaluate users' perceptions of ChatGPT's role, shedding light on the anthropomorphism of AI. This study contributes to the wider discussion on human-AI relationships, emphasizing the significance of incorporating emotional intelligence into AI systems for a user-centered future.

A Research on the Improvement of Dining Space Design at Elderly Welfare Facility (복지관의 경로식당 공간 디자인의 개선 방안에 관한 연구)

  • Ju, Jiyea;Oh, Eunjin;Kim, Jungki
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.20 no.4
    • /
    • pp.39-48
    • /
    • 2014
  • Purpose : Balanced meal service is very important for the elderly to maintain good physical health. Good food and comfortable dining environment is also important for the elderly to prevent emotional depression. The purpose of this study is to investigate current problems of dining space in Korean elderly welfare facility. De-institutionalizing dining environment of elderly welfare facility will bring more meaningful social interactions among elderly users. Methods : Through literature research and case studies of welfare centers in the US and Japan, Elderly Dining Space Checklist was developed. Dining spaces of 11 welfare facilities in Seoul was analyzed by this checklist. It was administered by interior designers as well as facility staffs to achieve more credible results. Questionnaire for the elderly users of those dining space also prosecuted to broaden knowledge for creating improved environment. Results : Dining spaces of elderly welfare centers are lack of privacy and furnitures are not comfortable enough for the general users as well as wheelchair users. Elderly dining space users are seeking more private and comfortable spaces for the social communications. Implications : Dining environment for the elderly in Korea should develop more de-institutionalized design concepts.

Digital Libraries as Scocio-Technical Interaction Networks: American Memory Project as one example of it (사회기술상호작용망(STIN)으로서의 디지털 도서관: American Memory Project를 중심으로)

  • Joung, Kyoung-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.4 s.50
    • /
    • pp.91-111
    • /
    • 2003
  • This paper shows that digital libraries can be understood through STIN models which emphasize interactions among components in networks. The enrollment strategies in the American Memory make human and non-human factors interact. Specifically, this paper articulates that the relationships between users and collections, between users and staff, and between users and users are closely linked through the strategies . Observing the linkages among these components ,this paper found that the enrollment processes not only draw users to the American Memory, but also alter roles of components and creates new roles and players for them. The alterations of roles and the resulting changes of relationships among components mean that digital libraries lead to transform the grounding of knowledge works in a society.

Utilization of Log Data Reflecting User Information-Seeking Behavior in the Digital Library

  • Lee, Seonhee;Lee, Jee Yeon
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.1
    • /
    • pp.73-88
    • /
    • 2022
  • This exploratory study aims to understand the potential of log data analysis and expand its utilization in user research methods. Transaction log data are records of electronic interactions that have occurred between users and web services, reflecting information-seeking behavior in the context of digital libraries where users interact with the service system during the search for information. Two ways were used to analyze South Korea's National Digital Science Library (NDSL) log data for three days, including 150,000 data: a log pattern analysis, and log context analysis using statistics. First, a pattern-based analysis examined the general paths of usage by logged and unlogged users. The correlation between paths was analyzed through a χ2 analysis. The subsequent log context analysis assessed 30 identified users' data using basic statistics and visualized the individual user information-seeking behavior while accessing NDSL. The visualization shows included 30 diverse paths for 30 cases. Log analysis provided insight into general and individual user information-seeking behavior. The results of log analysis can enhance the understanding of user actions. Therefore, it can be utilized as the basic data to improve the design of services and systems in the digital library to meet users' needs.

Multi Spatial Interaction Interface in Large-scale Interactive Display Environment (대규모 인터랙티브 디스플레이 환경에서의 멀티 공간 인터랙션 인터페이스)

  • Yun, Chang-Ok;Park, Jung-Pil;Yun, Tae-Soo;Lee, Dong-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.43-53
    • /
    • 2010
  • The interactive display is providing various interaction modes to users through various ubiquitous computing technologies. These methods were studied for their interactions, but the limits that it is provided to only single user and the device usability were generated. In this paper, we propose a new type of spatial multi interaction interface that provide the various spatial touch interactive to multi users in the ambient display environment. Therefore, we generate the interaction surface so that a user can interact through the IR-LEDs Array Bar installed in the ceiling of the ambient display environment. At this time, a user can experience the various interactions through the spatial touch in an interaction surface. Consequently, this system offers the interactive display and interface method that the users can interact through natural hand movement without the portable devices.

The Expected Role of Librarian 2.0 in the Library 2.0 Era (도서관 2.0 시대의 사서 2.0에게 기대되는 역할에 관한 연구)

  • Syn, Sue-Yeon;Kim, Sung-Min
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.2
    • /
    • pp.201-216
    • /
    • 2010
  • The idea of Library 2.0 originated from the concept of Web 2.0 social interactions within the Web. From this aspect, Library 2.0 is a library blended with Web 2.0. The most remarkable features of Library 2.0 are interactions and user involvement. Users' roles in new library environments are greater since they can contribute to establishing a library collection by annotating, blogging, reviewing, etc. While users' roles become important, the responsibilities of the librarians increase due to the unfiltered information created by users. Librarians now should extend their roles as information creators, organizers, providers, managers, as well as moderators. In this paper, we reviewed the current literature on the new paradigm of digital libraries, Library 2.0, and the development of Library 2.0. In addition, we discuss the extended role of the Librarian 2.0 in Library 2.0.

A Study on the In-Vehicle Voice Interaction Structure Considering Implicit context with Persistence of Conversation (대화 지속성 암묵적 단서를 고려한 차량 내 음성 인터랙션 구조 연구)

  • Namkung, Kiechan
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.2
    • /
    • pp.179-184
    • /
    • 2021
  • In this study, the conversation behavior of users is investigated by using in-vehicle voice interaction system. The purpose of this study is to identify the elements of conversations that the users expect in voice interactions with systems and present the structural improvements to enable the voice interactions similar to those between people. To observe the users' behavior of voice interaction in the vehicle, the data through contextual inquiry are collected and the interview contents are analyzed by using the open coding. We have been able to explore the usefulness of voice interaction features, which are of great importance in that they increase the user's satisfaction with the features and their usage persistence. This study is meaningful in analyzing the user's empirical needs for the technology of interpersonal model from the perspective of conversation.

The Effect of Media Richness, Social Presence, and Life Satisfaction on Continuance Usage Intention or Withdrawal Intention of SNS Users via Relative Deprivation (매체 풍요도, 사회적 존재감 및 생활 만족도가 상대적 박탈감을 통해 SNS 이용자의 이용 지속 의도 또는 이탈 의도에 미치는 영향)

  • Lee, Un-Kon
    • Journal of Distribution Science
    • /
    • v.14 no.10
    • /
    • pp.165-178
    • /
    • 2016
  • Purpose - This study aims to empirically verify the impact of media richness, social presence, and prior life satisfaction on various continual usage or withdrawal behaviors of SNS users via both a positive path of satisfaction and a negative path of relative deprivation. By identifying these causal paths, we observe dynamic interactions of SNS user psychology in a balanced view, and provide some implications about design principles for SNS providers. Research design, data, and methodology - We developed 16 hypothesis based on media richness theory, social presence theory, social comparison theory, the literature about relative deprivation, and the literature about the various reactions of IS users. The rich SNS media, social presence recognition among peer SNS users, and prior life satisfaction could generate positive experience, attitude, and virtuous behavioral intentions among SNS users. At the same time, rich media, low social presence, and low prior life satisfaction could generate relative deprivation and could increase withdrawal behavioral intentions such as refusal to provide information, misrepresentation of information, and removal of uploaded information in SNS. Scenario surveys were conducted to collect data from potential SNS users. Data from 357 surveys were collected and analyzed through a PLS algorithm to test the hypotheses. Results - Media richness, social presence, and prior life satisfaction could significantly increase perceived enjoyment, satisfaction, and behavioral intention of continual usage and knowledge sharing. They also could significantly decrease refusal and misrepresentation intention. Relative deprivation is significantly decreased only by prior life satisfaction. Relative deprivation could not significantly decrease satisfaction, but it could significantly increase misrepresentation and removal intention, which could be regarded as information distortion intention. Conclusions - SNS providers should focus on developing rich media and social presence support because these two variables could impact the positive experiences of SNS users. Moreover, the positive experiences could heavily influence SNS user behavior. Some management is needed to prevent relative deprivation and its consequences of misrepresentation and removal intention. SNS providers should prevent SNS users from excessive image misrepresentation and removal as this information distortion could be the source of relative deprivation.

A Study on the Effect of Learning Activities and Feedback Seeking Behavior toward the End Users' Faithful Appropriation of Information Security System (조직내 최종사용자의 합목적적인 정보보호 시스템 사용 내재화와 학습, 피드백 추구 행동 연구)

  • Kim, Min Woong;Cheong, Ki Ju
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.117-146
    • /
    • 2016
  • Purpose The purpose of this paper is to examine factors and mechanism inducing end users' faithful appropriation of information security behavior through the information security system. This study is also trying to find out the role of Employees' adaptive activities like learning and feedback seeking behavior for the information security in organizations. Design/methodology/approach An empirical study was carried out with a sample of employees working in the financial service company. Employees(n = 268) completed a written questionnaire. Structural equation modeling was used to analyze the data. Findings Results indicated that employees' learning activities and feedback seeking behavior fully mediated the effect of major information security factors toward end users' faithfulness of appropriation of information security systems. In order to increase the level of employees information security behavior in accordance with security guideline, organizations should facilitate interactions that support the feedback seeking process between employees on information security awareness and behavior. Additionally, organizations may reinforce these behaviors by periodical training and adopting bounty hunter systems.