• Title/Summary/Keyword: ease of use of ICT technology

Search Result 18, Processing Time 0.026 seconds

A Study on the Factors Influencing on the Intention to Continuously Use a Smart Factory (스마트 팩토리 지속사용의도에 영향을 미치는 요인에 관한 연구)

  • Kim, Hyun-gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.2
    • /
    • pp.73-85
    • /
    • 2020
  • While Korea became one of manufacturing powers in the world through a fast-follower strategy as well as implementing the approach of advancing manufacturing business focused on quantitative input, The advent of the fourth industrial revolution and demand becoming more complicated than ever both require a system that quickly detects the change of markets in advance and reflects it in the manufacturing strategy. Accordingly, the introduction of a smart factory is not optional but mandatory in order to strengthen the competitiveness of manufacturing business using ICT. This paper aims to investigate key factors having influence on the intention to continuously use a smart factory, the innovative IT device, on the basis of the technology acceptance model. This paper analyzed the influence of the leadership of CEO, organizational learning and perceived switching costs on the intention to continuously use a smart factory by the parameters of perceived ease of use and usefulness, the major belief valuables of the IT acceptance model.

A Study on the Acceptance of Information Literacy Instruction for School Libraries in Korea (학교도서관 중심의 정보활용능력 교육 수용에 관한 연구)

  • Kim Yeon-Rye;Hong Hyun-Jin
    • Journal of Korean Library and Information Science Society
    • /
    • v.37 no.3
    • /
    • pp.3-32
    • /
    • 2006
  • This paper examined the information literacy which is the concrete purpose of the ICT using education which appeared in order to elevate the effects of education in school after the introduction of the 7th educational curriculum. Based on TAM (Technology Acceptance Model) that provides useful theoretical foundations for analyzing the factors influencing acceptance and diffusion of IT, it determined the factors influencing the process of accepting the information literacy instruction as follows: perceived usefulness; perceived ease of use; attitude; effects of the information literacy instruction; teachers' innovation; school library relevance; school librarians' support; and the self-efficacy. This paper confirmed the influences of these factors on the process of accepting the information literacy through empirical study. Through this study, it intended to suggest the ways to activate of the information literacy instruction.

  • PDF

Application of TAM and QFD for analyzing the user requirement in u-Healthcare System - Focused on fitness service (u-헬스케어 시스템에서 사용자 요구사항을 분석하기 위한 TAM과 QFD의 적용 - u-휘트니스 서비스 중심)

  • Kim, Min-Cheol
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.191-196
    • /
    • 2012
  • The importance of hi-tech communications technology including mobile or ubiquitous system and the related business field is currently expanding. In terms of wellness for enhancing quality of individual life, ICT technology became a requirement, not an option. The first purpose of this study is to identify factors that influence user's perceived usefulness & perceived ease of use related to the acceptance of TAM focused on ubiquitous fitness service through multiple regression analysis, thereby discovering important factors influencing consumer behavior. In conjunction with the result, the second purpose of this study has also its implication on the u-Healthcare system development using QFD. That is, this research is to propose the possibility of combining the external variables of TAM to u-Healthcare system service characteristics with user requirement reflected by using QFD method. Based on these results, the suitable system may be constructed and developed.

Performance Analysis of IEEE 802.15.4 for D1 Small Distribution Substation (D1 소규모 배전 변전소를 위한 IEEE 802.15.4 성능 분석)

  • Hwang, Sung-Ho;Kang, Eun-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.115-121
    • /
    • 2017
  • Times New RomanThe utilization of Information and Communication Technologies (ICT) in the smart grid application can construct efficient and reliable electrical grid. IEC 61850 was adopted as the standard for smart grid exchanging the information required in an electric power utility. However, applying technologies like IEC 61850 using Ethernet to the automation of small distribution substation directly may cost more than the value of the small distribution substation itself. IEEE 802.15.4 technology attracts attention in the field of power utility automation because of low installation cost and ease of installation. Studies are conducted, which use IEEE 802.15.4 in less strict D1 small distribution substation. This study applied IEEE 802.15.4 to the small distribution substation and conducted performance evaluation using the actual equipment. This study determined the scope of application of IEEE 802.15.4 by conducting a comparative analysis of the message type in IEC 61850.

Research in information & communication technology for water in the four major rivers restoration project (4대강 사업에서 수자원 정보통신기술 발전방향연구)

  • Seo, Gang-Do;Jang, Sang-Bok;Lee, Dong-Hoon;Hwang, Jae-moon;Park, Byung-Don
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.184-187
    • /
    • 2013
  • The Four Major Rivers Restoration Project of is the multi-purpose green growth project in South Korea. Some of the project was progressed by K-water and was declared complete on October 21, 2011. The Four Rivers Restoration Project of Korea was designed to be a packaged project that aims to resolve water-related problems such as floods and droughts and revitalize Korean public spaces near the water. K-water have applied the latest ICT(Information and Communication Technology) for the operating management of 4 Rivers Project facilities. We also have applied ICT for integrating drinking water production facilities. Applying these ICT, we have many experience for integrated water resources management, so we proposed. The first is that the big data collected should be analyzed for making decisions and taking actions while considering multiple viewpoints of how water should be managed. The second is that the new MMI(Man Machine Interface) program should be developed to use domestic needs and promote ease of maintenance for the integrated operation. The third is that the standardization of communication protocol is needed for seamless communication between equipments.

  • PDF

Cloud Platform for Smartfarm (스마트팜을 위한 클라우드 플랫폼)

  • Lee, Meong-hun;Yi, Se-yong;Kim, Joon-yong;Yoe, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.496-499
    • /
    • 2016
  • The smartfarm is a leader in the Field of environmental monitoring in agriculture. By the use of wireless remote systems, monitoring applications of the smartfarm are able to provide vital information to the farmer wherever he may be. Absentee farmers are finding the ease of viewing the application graphs on their mobile phone is providing them with peace of mind. We design system and technical requirements of service for managing and operating smart-farm based on cloud technology. It describes requirements of cloud technology for monitoring, controlling, managing, and operating cloud-based smart farm. Smart farm system and service with cloud platform contains 3 interfaces and 3 services. In addition, smart-farm using cloud platform could have several cases so it should be established and managed in varying way depending on cultivars, its size and type. This paper will focus the industry's attention on the importance of Open/Standard Cloud platform thereby stimulating the smartfarm in agriculture.

  • PDF

A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment (산업융합환경에서 조직의 보안성 향상을 위한 센싱시스템 구축 연구)

  • Na, Onechul;Lee, Hyojik;Sung, Soyoung;Chang, Hangbae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.139-146
    • /
    • 2015
  • WSN has been utilized in various directions from basic infrastructure of environment composition to business models including corporate inventory, production and distribution management. However, as energy organizations' private information, which should be protected safely, has been integrated with ICT such as WSN to be informatization, it is placed at potential risk of leaking out with ease. Accordingly, it is time to need secure sensor node deployment strategies for stable enterprise business. Establishment of fragmentary security enhancement strategies without considering energy organizations' security status has a great effect on energy organizations' business sustainability in the event of a security accident. However, most of the existing security level evaluation models for diagnosing energy organizations' security use technology-centered measurement methods, and there are very insufficient studies on managerial and environmental factors. Therefore, this study would like to diagnose energy organizations' security and to look into how to accordingly establish strategies for planning secure sensor node deployment strategies.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.