• 제목/요약/키워드: Users' behaviors

검색결과 653건 처리시간 0.028초

메타버스 플랫폼 '제페토' 이용자의 가상패션 스타일 선호도 및 구매행태 분석 (Analysis of Virtual Fashion Style Preferences and Purchasing Behavior of Metaverse Platform 'Zepeto' Users)

  • 김가야;성옥진;김숙진
    • 패션비즈니스
    • /
    • 제26권3호
    • /
    • pp.33-49
    • /
    • 2022
  • In the metaverse, it is important to embellish aesthetics of user with a character called 'Avatar', a virtual representation of the user. This study provides basic data related to the fashion trend of the metaverse by studying 'Zepeto', a representative Korean platform. For empirical research, Zepeto's "Best Items" section were investigated and analyzed in the first pre-survey. Based on this, the second and main survey was conducted using a questionnaire to investigate users' style-specific preferences and purchasing behaviors for virtual fashion, comparing style preferences between virtual and real, brand preferences, and purchasing behaviors of virtual fashion. The survey found that most users were teenage girls with a high preference for pastel-toned, feminine, and cute casual styles who had a much higher interest in brands bearing idol names than in real-world luxury brands. Many responded that they felt burdened by purchasing items that had to be purchased for cash. The same can be assumed to be the reason why they preferred a suit of items that were fully coordinated rather than individual items. These results seem to reflect characteristics of teenage girls who lack cash with a high preference for idols and feminine-cute casual styles. This study suggests considerations when creating virtual fashion items. By providing basic information, more effects and developments in creating virtual fashion items that reflect consumer preferences and reactions are expected in the future.

재생 정보 기반 우연성 지향적 음악 추천에 관한 연구 (A Study on Serendipity-Oriented Music Recommendation Based on Play Information)

  • 하태현;이상원
    • 대한산업공학회지
    • /
    • 제41권2호
    • /
    • pp.128-136
    • /
    • 2015
  • With the recent interests with culture technologies, many studies for recommendation systems have been done. In this vein, various music recommendation systems have been developed. However, they have often focused on the technical aspects such as feature extraction and similarity comparison, and have not sufficiently addressed them in user-centered perspectives. For users' high satisfaction with recommended music items, it is necessary to study how the items are connected to the users' actual desires. For this, our study proposes a novel music recommendation method based on serendipity, which means the freshness users feel for their familiar items. The serendipity is measured through the comparison of users' past and recent listening tendencies. We utilize neural networks to apply these tendencies to the recommendation process and to extract the features of music items as MFCCs (Mel-frequency cepstral coefficients). In that the recommendation method is developed based on the characteristics of user behaviors, it is expected that user satisfaction for the recommended items can be actually increased.

조직내 최종사용자의 합목적적인 정보보호 시스템 사용 내재화와 학습, 피드백 추구 행동 연구 (A Study on the Effect of Learning Activities and Feedback Seeking Behavior toward the End Users' Faithful Appropriation of Information Security System)

  • 김민웅;정기주
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제25권3호
    • /
    • pp.117-146
    • /
    • 2016
  • Purpose The purpose of this paper is to examine factors and mechanism inducing end users' faithful appropriation of information security behavior through the information security system. This study is also trying to find out the role of Employees' adaptive activities like learning and feedback seeking behavior for the information security in organizations. Design/methodology/approach An empirical study was carried out with a sample of employees working in the financial service company. Employees(n = 268) completed a written questionnaire. Structural equation modeling was used to analyze the data. Findings Results indicated that employees' learning activities and feedback seeking behavior fully mediated the effect of major information security factors toward end users' faithfulness of appropriation of information security systems. In order to increase the level of employees information security behavior in accordance with security guideline, organizations should facilitate interactions that support the feedback seeking process between employees on information security awareness and behavior. Additionally, organizations may reinforce these behaviors by periodical training and adopting bounty hunter systems.

Understanding Smartphone-based Online Shopping Experiences and Behaviors of Blind Users

  • Park, Jihyuk;Han, Yeji;Oh, Uran
    • International journal of advanced smart convergence
    • /
    • 제9권3호
    • /
    • pp.260-271
    • /
    • 2020
  • Smartphones provide blind users with screenreader as an accessibility tool. However, blind users often experience difficulties accessing online shopping malls via smartphones due to their inconsistent and image-based layouts. To enable screenreader users to get access to the detailed information about products while they are shopping online, we have developed BarrierFreeShop, an accessible mobile shopping application for people with visual impairments. BarrierFreeShop has three accessibility features: (1) layout automation, (2) review summarization, and (3) optical character recognition. We conducted a user study with 80 participants with visual impairments where they were asked to use BarrierFreeShop for a month. The findings revealed the effectiveness of our app in terms of speed and post interview feedback. We have also discovered typical shopping experiences that participants had during the test. This research suggests that computer vision technologies can improve accessibility issues in online shopping malls. In addition, we have confirmed that extracting contents from images help people with visual impairments to get better access to product information.

In-depth Understanding of STEM Information Needs using FGI

  • Park, Minsoo
    • International Journal of Advanced Culture Technology
    • /
    • 제8권3호
    • /
    • pp.280-284
    • /
    • 2020
  • In the rapidly changing science and technology environment, an in-depth understanding of users of STEM information is an essential factor in designing a user-centered information system. The purpose of this study is to investigate and analyze in-depth the behaviors and needs of users who use STEM information. In this study, the needs of users for STEM information and STEM information sites are dealt with in depth using the FGI qualitative method. In addition, it includes the analysis results of grouping of similar sites according to various aspects of use of STEM information sites. As a result of grouping similar sites based on awareness and level of use,, they were grouped by domestic-international, paid-free, integrated-specific fields. As a result of grouping similar sites according to the purpose of use, they were grouped by domestic and international papers, research reports, and patents. As a result of grouping similar sites according to usage attributes, they were grouped by diversity, reliability, and specialization. As for the positions of similar sites perceived by users, Science Direct and PubMed showed high specialization and high quality, Google Scholar showed integration and popularity, and RISS showed four attributes evenly. Suggestions for information system design are discussed.

A Solution to Privacy Preservation in Publishing Human Trajectories

  • Li, Xianming;Sun, Guangzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권8호
    • /
    • pp.3328-3349
    • /
    • 2020
  • With rapid development of ubiquitous computing and location-based services (LBSs), human trajectory data and associated activities are increasingly easily recorded. Inappropriately publishing trajectory data may leak users' privacy. Therefore, we study publishing trajectory data while preserving privacy, denoted privacy-preserving activity trajectories publishing (PPATP). We propose S-PPATP to solve this problem. S-PPATP comprises three steps: modeling, algorithm design and algorithm adjustment. During modeling, two user models describe users' behaviors: one based on a Markov chain and the other based on the hidden Markov model. We assume a potential adversary who intends to infer users' privacy, defined as a set of sensitive information. An adversary model is then proposed to define the adversary's background knowledge and inference method. Additionally, privacy requirements and a data quality metric are defined for assessment. During algorithm design, we propose two publishing algorithms corresponding to the user models and prove that both algorithms satisfy the privacy requirement. Then, we perform a comparative analysis on utility, efficiency and speedup techniques. Finally, we evaluate our algorithms through experiments on several datasets. The experiment results verify that our proposed algorithms preserve users' privay. We also test utility and discuss the privacy-utility tradeoff that real-world data publishers may face.

웹 이용자의 검색엔진 활용 및 탐색 행위와 성향 분석 (Analysis of Search Engine Use, Search Behaviors and Aptitude by Web Users)

  • 이해영
    • 한국문헌정보학회지
    • /
    • 제36권3호
    • /
    • pp.69-91
    • /
    • 2002
  • 본 연구는 웹 이용자들이 검색엔진을 어떻게 선택하여. 어떠한 기능들을 활용하며, 검색결과는 어떻게 평가하는지 그리고 어떤 어려움을 겪고 있는지를 밝혀 보고자 하였다. 28명의 대학의 교수와 대학원생으로 구성된 이용자들을 대상으로 한 인터뷰결과를 분석한다. 연구 결과에 따르면, 본 연구의 참가자들은 검색결과에 대한 평가보다는 특정한 기능이나 익숙함에 근거하여 엔진을 선택하였다. 이들은 통합검색에 대해서는 의견이 양분되어 있었으며, 연산자의 사용이 결과에 미치는 영향이 거의 없다고 보고 있었다. 검색엔진에 대한 평가를 내릴 때에도 검색결과의 정확성외에 결과를 보여주는 인터페이스 디자인에도 상당한 관심을 가지고 있는 것으로 나타났다.

모바일 폰에서의 양 손을 이용한 한글 입력 수행도 예측 모델에 대한 연구 (Two - Handed Hangul Input Performance Prediction Model for Mobile Phone)

  • 이주우;명노해
    • 대한인간공학회지
    • /
    • 제27권4호
    • /
    • pp.73-83
    • /
    • 2008
  • With a rapid extension of functions in mobile phones, text input method has become very important for mobile phone users. Previous studies for text input methods were focused on Fitts' law, emphasizing expert's behaviors with one-handed text input method. However, it was observed that 97% of Korean mobile phone users input texts with two-hands. Therefore, this study was designed to develop a prediction model of two-handed Hangul text entry method including novice users as well as experts for mobile phone. For this study, Fitts' law was hypothesized to predict experts' movement time(MT) whereas Hick-Hyman law for visual search time was hypothesized to be added to MT for novices. The results showed that the prediction model was well fitted with the empirical data for both experts and novices with less than 3% error rates. In conclusion, this prediction model of two-handed Hangul text entry including novice users was proven to be a very effective model for modeling two-handed Hangul text input behavior for both experts.

Self-Disclosures on Facebook: The Two Faces of Narcissism

  • Lee, Jongmin;Lee, Jihye;Song, Young-A;Ahn, Hongmin;Lee, Eunji;Sung, Yongjun
    • International Journal of Advanced Culture Technology
    • /
    • 제8권2호
    • /
    • pp.139-145
    • /
    • 2020
  • Individual personality traits are key factors that affect users' self-disclosure on SNS. We examined the relationship between an individual personality trait (i.e., narcissism) and three dimensions of self-disclosure behavior on Facebook (i.e., intention, level, and control of self-disclosure). A total of 261 Facebook users completed an online survey. The findings showed that more narcissistic individuals engage in deeper levels of self-disclosure and do so with greater intentionality than previous research indicated. More interestingly, narcissistic users simultaneously tend to control their expressions in public by concealing who they really are. Overall, these findings suggested that the self-disclosures on Facebook must not investigated by a single dimensions for better understanding of psychological dynamics of it users. In addition, the present research suggested that the narcissism should not be regarded as a predictor which simply gives either a positive or negative influence on self-disclosing behaviors in SNS.

대학도서관이용자 불평행동의 영향요인에 관한 실증적 연구 - 대구경북지역 대학생이용자를 중심으로 - (Complaining Behavior and Its Antecedents of Academic Library Users)

  • 오동근
    • 한국문헌정보학회지
    • /
    • 제36권4호
    • /
    • pp.123-145
    • /
    • 2002
  • 이 연구에서는 대구경북지역의 대학도서관이용자 582명을 대상으로, 불만족의 강도와 무료이용지각, 불평에 대한 태도, 불평비용, 불평의 성공가능성, 서비스의 중요성, 외적귀인, 충성도 둥의 불평행동의 선행요인이 이용중단, 직접 및 간접항의, 부정적 구전, 제3자를 통한 불평 둥의 각 불평행동 유형에 미치는 영향을 실증적으로 분석하였다.