• Title/Summary/Keyword: Users'behavior

Search Result 1,680, Processing Time 0.034 seconds

A Study on User Behavior of University Library Website based Big Data: Focusing on the Library of C University (빅데이터 기반 대학도서관 웹사이트 이용행태에 관한 연구: C대학교 도서관을 중심으로)

  • Lee, Sun Woo;Chang, Woo Kwon
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.3
    • /
    • pp.149-174
    • /
    • 2019
  • This study analyzes the actual use data of the websites of university libraries, analyzes the users' usage behavior, and proposes improvement measures for the websites. The study analyzed users' traffic and analyzed their usage behavior from January 2018 to December 2018 on the C University website. The website's analysis tool used 'Google Analytics'. The web traffic variables were analyzed in five categories: user general characteristics, user environment analysis, visit analysis, inflow analysis, site analysis, and site analysis based on the metrics of sessions, users, page views, pages per session, average session time, and bounce rate. As a result, 1) In the analysis results of general characteristics of users, there was some access to the website not only in Korea but also in China. 2) In the user experience analysis, the main browser type appeared as Internet Explorer. The next place was Chrome, with a bounce rate of Safari, third and fourth, double that of the Explore or Chrome. In terms of screen resolution, 1920x1080 resolution accounted for the largest percentage, with access in a variety of other environments. 3) Direct inflow was the highest in the inflow media analysis. 4) The site analysis showed the most page views out of 4,534,084 pages, followed by the main page, followed by the lending/extension/history/booking page, the academic DB page, and the collection page.

The Effects of Belongingness and Loneliness on Self-Disclosure in MIM: The Moderating Role of System Quality (모바일 인스턴트 메신저 상황에서 소속감, 외로움이 자기노출 행동에 미치는 영향: 시스템 품질의 조절효과를 중심으로)

  • Jung, Bo-Hee;Kim, Han-Ku
    • Journal of Distribution Science
    • /
    • v.14 no.9
    • /
    • pp.85-94
    • /
    • 2016
  • Purpose - Recently, Mobile technologies and devices including smart phones and tablets have increased the possibility of communicating with other people and sharing personal information without time and space restriction. In order to realize the market potential related to mobile technologies, a large number of internet services have been incorporated into mobile platforms. Especially, The number of MIM(Mobile Instant Messenger) users has been increasing dramatically and services using MIM platform also have diversified. In spite of drastic growth in markets related to MIM, there is little empirical research on MIM and users' behaviors. This study designed to examine the structural relationships among belongingness, loneliness, self-disclosure intention, system quality, and self-disclosure behavior in context of MIM. Research design, data, and methodology - Three hypotheses were about the relationship among belongingness, loneliness and self-disclosure intention. The other two hypotheses were about the moderating effect of system quality in the causal relationship between self-disclosure intention and self-disclosure behavior. The data was analyzed by structural equation modeling. Research data were obtained from 330 undergraduate students who were KakaoTalk users and total 314 valid questionnaires were used in the final analysis. Results - The results from this study are as follow. First, the belongingness and the loneliness had a significant impact on self-disclosure intention in MIM. Second, the self-disclosure intention in MIM also had a positive impact on the self-disclosure behavior. Lastly, there is a moderating effect of the system quality in the relationship between the self-disclosure intention and self-disclosure behavior in MIM. Specifically, the higher system quality level was perceived, the positive effect of the self-disclosure intention in MIM on the self-disclosure behavior was greater. Conclusions - Based on the results from this study, academic and practical implications can be drawn. First, the study extends the scope of research about SNS through focusing on MIM to be classified by closed type SNS and identifies the relationship between emotion, behavioral intention and behaviors in MIM. Second, this study provides strategic guidelines to increase the efficiency for promotion activity. Limitations for the study also should be discussed.

A Systematic Method of Hinting Interface Design (체계적인 힌팅 인터페이스 설계 방법의 연구)

  • Lee, Eun-A;Yun, Wan-Cheol;Park, Wan-Su
    • Journal of the Ergonomics Society of Korea
    • /
    • v.25 no.2
    • /
    • pp.125-134
    • /
    • 2006
  • Most users learn new, complex systems through trial-and-error experience rather than referring to the manuals in a cognitive process that is called 'exploratory learning'. While exploring a system, people find prototypical rules for using the system based especially on frequent tasks. The rules are formed from consistent task procedures and well-expected interface elements on the designed system. These rules play the role of the basis of users' knowledge for performing tasks. The decision making to select and apply those rules interacting with an interface can be aided by properly provided hints on the interface. With appropriate hints, users can learn new systems easily and use them with reduced usability problems. This paper first reports an observation of user behavior performing tasks with prototypical interaction rules and finds a sound set of criteria to extract prototypical interaction rules systematically. Two types of hints are defined. Extending hints prompt users to apply prototypical interaction rules beyond well-known tasks. Preventive hints guide users out of possible capture errors by drawing attention to the variation of rules. A systematic and practical method is proposed to identify the opportunities for both types in designing interfaces. It is then verified through a usability test that the proposed method is effective in identifying the locations and types of appropriate hints to reduce or mitigate usability problems.

Smart Service: Determinants Influencing Individual users' Intention to Adopt AppStore and the Moderating Effect of Value (스마트 서비스: 개인의 앱스토어 사용의도에 영향을 주는 요인과 가치의 조절효과)

  • Kim, Geun-A;Song, Young-Me;Kim, Sang-Hyun
    • The Journal of Information Systems
    • /
    • v.19 no.3
    • /
    • pp.181-208
    • /
    • 2010
  • As knowledge-based society comes to the fore, sharing knowledge becomes a hot issue. Among various types of knowledge, a significance of software(applications) and contents is a huge in a current society. Moreover, along with appearance of smartphone, for instance iPhone, Application Store(also known as AppStore) utilized as a common gateway for sharing software and contents, brings a big interest for many users and developers. However, prior research to understand users' behavior on AppStore has been a scant. Therefore, the main purpose of this study is to investigate the impact of key smart service environmental factors on AppStore in order to empirically explain users' psychological feelings of intention to use AppStore. Based on a well-known technology adoption model, TAM, the study incorporates three main characteristics(user, society, and service) with six constructs(Innovation, Enjoyment, Subjective Norm, Information Level, Content variety, and Cost), influencing perceived usefulness, which then affects users' intention to use AppStore. Results provide evidence that support the tested hypotheses. The implications of the findings suggest a new theoretical work for future AppStore research and offers suggestions that the researchers and practitioners of AppStore should consider regarding the development of application and contents.

Difference of Factors Affecting Continuance Use and Self-Disclosure of SNS Users: Focused on a Dual-Factor Model (SNS 사용자들의 지속 사용과 정보 공유에 영향을 미치는 선행 요인의 차이: 듀얼 팩터 모형을 중심으로)

  • Kim, Byoungsoo;Kim, Hyoeun;Kim, Dae-Kil
    • The Journal of Information Systems
    • /
    • v.25 no.4
    • /
    • pp.1-21
    • /
    • 2016
  • Purpose The study analyzed the factors affecting continuance use and self-disclosure in the SNS(social networking service) context based on a dual-factor model. As SNS users have concerned privacy for a long time, privacy concern affects continuous use and self-disclosure. In details, concern over privacy may have a stronger effect on self-disclosure than on continuance use as users' personal information can be more exposed during posting their dailies and photos. Design/Methodology/Approach SNS benefits, trust in SNS providers, and social influence are served as the key enablers and privacy concern as the inhibitor. Moreover, the relative impacts of SNS benefits and privacy concern on continuance use and self-disclosure were analysed in this study. From the data of 327 Facebook users, the researchers tested proposed theoretical model by using PLS. Findings Users' continuance intention and self-disclosure behavior are differently affected by different antecedents. Trust in SNS provider had a significant effect on self-disclosure intention, while it has no significant effect on continuance intention. Concern over privacy was negatively related to self-disclosure intention, while it was positively associated with continuance intention.

Movie Recommendation System Based on Users' Personal Information and Movies Rated Using the Method of k-Clique and Normalized Discounted Cumulative Gain

  • Vilakone, Phonexay;Xinchang, Khamphaphone;Park, Doo-Soon
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.494-507
    • /
    • 2020
  • This study proposed the movie recommendation system based on the user's personal information and movies rated using the method of k-clique and normalized discounted cumulative gain. The main idea is to solve the problem of cold-start and to increase the accuracy in the recommendation system further instead of using the basic technique that is commonly based on the behavior information of the users or based on the best-selling product. The personal information of the users and their relationship in the social network will divide into the various community with the help of the k-clique method. Later, the ranking measure method that is widely used in the searching engine will be used to check the top ranking movie and then recommend it to the new users. We strongly believe that this idea will prove to be significant and meaningful in predicting demand for new users. Ultimately, the result of the experiment in this paper serves as a guarantee that the proposed method offers substantial finding in raw data sets by increasing accuracy to 87.28% compared to the three most successful methods used in this experiment, and that it can solve the problem of cold-start.

Indifference Problems of Personal Information Protection of Social Media Users due to Privacy Paradox (소셜미디어 사용자의 프라이버시 패러독스 현상으로 인한 개인정보 무관심 형태에 대한 연구)

  • Kim, Yeonjong;Park, Sanghyeok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.213-225
    • /
    • 2019
  • Privacy paradox is a paradoxical behavior that provides personal information even though you are concerned about privacy. Social media users are also often concerned about their personal information exposure. It is even reluctant to describe personal information in profile. However, some users describe their personal information in detail on their profile, provide it freely when others request it, or post their own personal information. The survey was conducted using Google Docs centered on Facebook users. Structural equation model analysis was used for hypothesis testing. As an independent variable, we use personal information infringement experiences. As a mediator, we use privacy indifference, privacy concern, and the relationship with the act of providing personal information. Social media users have become increasingly aware of the fact that they can not distinguish between the real world and online world by strengthening their image and enhancing their image in the process of strengthening ties, sharing lots of information and enjoying themselves through various relationships. Therefore, despite the high degree of privacy indifference and high degree of privacy concern, the phenomenon of privacy paradox is also present in social media.

Users' Satisfaction on the Dormitory of High School in Jeonju City (고등학교 기숙사 주거시설에 대한 사용자 만족도 - 개인공간 단위실을 중심으로 -)

  • An, Jin-Sook;Choi, Byung-Sook
    • Journal of the Korean housing association
    • /
    • v.18 no.6
    • /
    • pp.93-101
    • /
    • 2007
  • This study was to find out users' satisfaction on the dormitory of high school in Jeonju City and to propose it's physical environmental improvement directions. This was performed by a questionnaire survey method, and the questionnaire was designed by researchers considering relative literatures. Data were collected from 200 students, who had been dwelling 4 high school dormitories in Jeonju City. By analyzing those data, findings were as follows: 1) Users of students were satisfied the whole of their dormitory; facilities, spaces, and living. 2) They were highly concerned about a library and a personal unit space in their dormitory. 3) They needed their personal unit space to be designed bedroom+bathroom type with 2 persons' sharing and be equipped one story bed and desk furniture. Also, they needed improvement on heating & cooling, small space and indoor air quality of unit space. 4) The users' satisfaction on unit space were 2.88, and their satisfaction of the technical factor was 2.71 that was the lowest score in them. And The functional factor was highly effected their satisfaction. 5) The space utility and the space size of functional factor, the soundproof, the heating/ventilation and the indoor quality of technical factor, and the privacy of behavior factor were highly correlative to their satisfaction of unit space.

Perception of Public Safety of Night Users in Neighborhood Parks (도시공원 야간이용의 공공안전성 제고를 위한 요인 정합성 평가)

  • Rho, Jae-Hyun;Huh, Joon;Ahn, Deug-Soo
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.23 no.2
    • /
    • pp.213-222
    • /
    • 1995
  • To increase the night use level, this study was analyzed perception of users about the public safety, and extracted main variables which were influencing public safety. The public safety was evaluated by the actual (on site) and nonactual users (off site) and the Delphi method. The night users of female and the elders were relatively more than male and the young respectively as compared with day. Walking was predominant in approaching means. In public safety ratings, $\boxDr$vuknerability to violence$\boxUl$varied accoding to sex, income, education, marriage, job, age. $\boxDr$crowding, $\boxDr$noise$\boxUl$ were important variables in satisfying users at night. $\boxDr$Lack of surveillance, $\boxDr$harassment of other person$\boxUl$, $\boxDr$rowdy behavior in poorer visibility$\boxUl$, $\boxDr$fear in lower intensity of light$\boxUl$ and $\boxDr$vulnerability to violence$\boxUl$stood high , so it is required guarantee of security guard to enhance the park use at night Although the ratings between field and indoor evaluation were somewhat different the variables had so similiar rant.

  • PDF

Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System

  • Zhang, Wei;Wu, Yi;Xiong, Hu;Qin, Zhiguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.302-322
    • /
    • 2021
  • In the system of ciphertext policy attribute-based encryption (CP-ABE), only when the attributes of data user meets the access structure established by the encrypter, the data user can perform decryption operation. So CP-ABE has been widely used in personal health record system (PHR). However, the problem of key abuse consists in the CP-ABE system. The semi-trusted authority or the authorized user to access the system may disclose the key because of personal interests, resulting in illegal users accessing the system. Consequently, aiming at two kinds of existing key abuse problems: (1) semi-trusted authority redistributes keys to unauthorized users, (2) authorized users disclose keys to unauthorized users, we put forward a CP-ABE scheme that has authority accountability, user traceability and supports arbitrary monotonous access structures. Specifically, we employ an auditor to make a fair ruling on the malicious behavior of users. Besides, to solve the problem of user leaving from the system, we use an indirect revocation method based on trust tree to implement user revocation. Compared with other existing schemes, we found that our solution achieved user revocation at an acceptable time cost. In addition, our scheme is proved to be fully secure in the standard model.