• Title/Summary/Keyword: internet use behavior

Search Result 404, Processing Time 0.021 seconds

A Study on the Factors Influencing the Intention of Silve Generation to Use Internet (실버세대의 인터넷 활용 영향요인 연구)

  • Kim, Mi-Ryang;Kim, Tae-Ung;Kim, Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.145-158
    • /
    • 2009
  • No other change in Kora has offered gredter chalenges and opportunities than the emergence of the Internet and its related Information Technology. In the technology for accessing the ever growing wave of information. The quality of the silver generation is increasingly difficult to achieve because of the complexities of life in today's ICT(Information & Comunication Technology) dependent society, Life is more interesting when one knows what is going on, what opportunities exist, and when alternatives to current practices can be discovered and utilized with ease. The purpose of this study is to identify the determinants of attitude and planned behavior toward using internent for the quality of life. This study employ the intention to use internet, perceived ease of use, perceived usefuiness, self-efficacy, stress factor, generation gap, and income as major research variables, and collected 288 survey responses from senior citizen over 55. The results indicate that the perceived usefuiness and ease of use influence the intention to use internet, and that the self-efficacy, the ease of use and generation gap has some impact on the attitude, but the stree factor and the income level do not appear significant to the attitude. It was also found that the self-efficacy and the income level determine the level of ease of use. In addition, some useful suggestions concerning the continuing education program for silver generations are presented.

  • PDF

Efficient Driver Attention Monitoring Using Pre-Trained Deep Convolution Neural Network Models

  • Kim, JongBae
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.119-128
    • /
    • 2022
  • Recently, due to the development of related technologies for autonomous vehicles, driving work is changing more safely. However, the development of support technologies for level 5 full autonomous driving is still insufficient. That is, even in the case of an autonomous vehicle, the driver needs to drive through forward attention while driving. In this paper, we propose a method to monitor driving tasks by recognizing driver behavior. The proposed method uses pre-trained deep convolutional neural network models to recognize whether the driver's face or body has unnecessary movement. The use of pre-trained Deep Convolitional Neural Network (DCNN) models enables high accuracy in relatively short time, and has the advantage of overcoming limitations in collecting a small number of driver behavior learning data. The proposed method can be applied to an intelligent vehicle safety driving support system, such as driver drowsy driving detection and abnormal driving detection.

Consumer Typology and Online Travel Websites: Heterogeneity between Taiwanese and Korean Young Adults Repurchasing Behavior

  • Ha, Hong-Youl;Felix Mavondo;Siva Muthaly
    • Asia Marketing Journal
    • /
    • v.11 no.2
    • /
    • pp.121-147
    • /
    • 2009
  • This research attempts to investigate differences in past experiences of using internet in repurchasing. In doing so, the authors identify online consumer characteristics, particularly one-time and repeat users comparison across geographical borders of Korean and Taiwanese teenage customers. Results show that there are significant differences in online shopping typologies between Korean and Taiwanese customers. While attitude serves as a distinguishing factor for both data sets along the other two dimensions, trust does not. Since researchers have focused on comparisons between Western cultures and Asian cultures' online purchase behavior or Internet use, the current study provides a valuable comparison for this niche population of young customers at least in a Korean-Taiwanese context. The authors also make a brief argument that these findings can influence marketing practitioners and site developers in their strategies.

  • PDF

인터넷 메신저를 이용한 의사결정 환경에서의 커뮤니케이션패턴에 관한 연구

  • Park Sang Hyeok
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2004.11a
    • /
    • pp.499-513
    • /
    • 2004
  • This study identifies communication patterns of groups using Internet Messenger for their group decision-making, and examines how these patterns are associated with creative solutions to problems. Our research suggests that certain communication behavior of groups, when appropriately organized, can be of help in enhancing creative production of outcomes. A qualitative study was conducted on communication patterns based on an analysis of text-based electronic conversation protocols. Specifically this research tried to overcome existing studies on electronic groups by focusing on interactive process of communication among participants. The major study conclusions are: (1) The production of creative outcome may depend on the process or sequence of discussion among group members with Internet Messenger. That is, proper interactive responses and appropriate control of the discussion process are essential to obtain a high level of performance. (2) It is important to make discuss rules based on meta-cognitive and interactive protocols in the early stage. Explicit rules relating to internal group processes as well as communication medium use are even more important to groups with Internet Messenger than face-to-face groups.

  • PDF

A Study on Log Collection to Analyze Causes of Malware Infection in IoT Devices in Smart city Environments

  • Donghyun Kim;Jiho Shin;Jung Taek Seo
    • Journal of Internet Computing and Services
    • /
    • v.24 no.1
    • /
    • pp.17-26
    • /
    • 2023
  • A smart city is a massive internet of things (IoT) environment, where all terminal devices are connected to a network to create and share information. In accordance with massive IoT environments, millions of IoT devices are connected, and countless data are generated in real time. However, since heterogeneous IoT devices are used, collecting the logs for each IoT device is difficult. Due to these issues, when an IoT device is invaded or is engaged in malicious behavior, such as infection with malware, it is difficult to respond quickly, and additional damage may occur due to information leakage or stopping the IoT device. To solve this problem, in this paper, we propose identifying the attack technique used for initial access to IoT devices through MITRE ATT&CK, collect the logs that can be generated from the identified attack technique, and use them to identify the cause of malware infection.

Development and Validation of a Digital Literacy Scale in the Artificial Intelligence Era for College Students

  • Ha Sung Hwang;Liu Cun Zhu;Qin Cui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2241-2258
    • /
    • 2023
  • This study developed digital literacy instruments and tested their effectiveness on college students' perceptions of AI technologies. In creating a new digital literacy test tool, we reviewed the concept and scale of digital literacy based on previous studies that identified the characteristics and measurement of AI literacy. We developed 23 preliminary questions for our research instrument and used a quantitative approach to survey 318 undergraduates. After conducting exploratory and confirmatory factor analysis, we found that digital literacy in the age of AI had four ability sub-factors: critical understanding, artificial intelligence social impact recognition, artificial intelligence technology utilization, and ethical behavior. Then we tested the sub-factors' predictive powers on the perception of AI's usefulness and ease of use. The regression result shows that the most common powerful predictor of the usefulness and ease of use of AI technology was the ability to use AI technology. This finding implies that for college students, the ability to use various tools based on AI technology is an essential competency in the AI era.

A Study on Types of Behavior and Satisfaction Level on the Information on Internet Fashion Web Sites (패션웹사이트 이용실태와 정보만족도에 관한 연구)

  • 신수연;김희수
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.25 no.8
    • /
    • pp.1500-1511
    • /
    • 2001
  • The purpose of this study were (1) to analyze the current fashion web-sites on the internet, which were increasing rapidly in number, (2) to find out the users purchase experiences of fashion products at internet shopping malls and satisfaction level on the information provided by the fashion sites. The questionnaire was administered to 332 women & men and data were analyzed by frequency, mean, standard deviation, factor analysis, reliability analysis, ANOVA and t-test. The results of this study were as follows. The factors on the satisfaction of information fashion web-sites categorized as 5 areas: Economy$.$Convenience, Aesthetics $.$Recreation, Variety $.$Interests, Up-to dateness $.$Specialization, and Reliability$.$ Precision. On the factor of Economy$.$Convenience, the users who had more frequent access and who were in their 20’s expressed the higher level satisfaction. On the factor of Aesthetics$.$Recreation, the users who had longer periods of time of use, who had lower level of internet shopping mall involvement, and students appeared to be more satisfied. On the factor of Variety$.$Interests, the users marking higher level of satisfaction were those who had higher frequency of uses, who had shorter period of time of use, who had lower level of internet shopping mall involvement and were students. On the factor of Up-to-dateness$.$Specialization, higher level of satisfaction was shown among the users who had shorter period of time of use, who had higher frequency of uses, who were in their 20’s and who were students. There was no significant differences according to Reliability & Precision factor.

  • PDF

Dynamic Signature Verification System for the User Authentication Security (사용자 인증 보안을 위한 동적 서명인증시스템)

  • 김진환;조혁규;차의영
    • Proceedings of the IEEK Conference
    • /
    • 2002.06c
    • /
    • pp.131-134
    • /
    • 2002
  • As the increased use of computer, wired/wireless/mobile Internet, security in using Internet becomes a more important problem. Thus, biometric technology using physical and behavior characteristics of a person is hot issue. Many different types of biometric technologies of a person such as fingerprint, face, iris, vein, DNA, brain wave, palm, voice, dynamic signature, etc. had already been studied but remained unsuccessful because they do not meet social demands. However, recently many of these technologies have been actively revived and researchers have developed new products on various commercial fields. Dynamic signature verification technology is to verify the signer by calculating his writing manner, speed, angle, and the number of strokes, order, the down/up/movement of pen when the signer input his signature with an electronic pen for his authentication. Then signature verification system collects mentioned above various feature information and compares it with the original one and simultaneously analyzes to decide whether signature is forgery or true. The prospect of signature verification technology is very promising and its use will be wide spread in terms of economy, security, practicality, stability and convenience.

  • PDF

Improving efficiency of remote data audit for cloud storage

  • Fan, Kuan;Liu, Mingxi;Shi, Wenbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.2198-2222
    • /
    • 2019
  • The cloud storage service becomes a rising trend based on the cloud computing, which promotes the remote data integrity auditing a hot topic. Some research can audit the integrity and correctness of user data and solve the problem of user privacy leakage. However, these schemes cannot use fewer data blocks to achieve better auditing results. In this paper, we figure out that the random sampling used in most auditing schemes is not well apply to the problem of cloud service provider (CSP) deleting the data that users rarely use, and we adopt the probability proportionate to size sampling (PPS) to handle such situation. A new scheme named improving audit efficiency of remote data for cloud storage is designed. The proposed scheme supports the public auditing with fewer data blocks and constrains the server's malicious behavior to extend the auditing cycle. Compared with the relevant schemes, the experimental results show that the proposed scheme is more effective.

Analyzing the Privacy Leakage Prevention Behavior of Internet Users Based on Risk Perception and Efficacy Beliefs : Using Risk Perception Attitude Framework (위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석 : 위험지각태도 프레임웍을 기반으로)

  • Jang, Ickjin;Choi, Byounggu
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.3
    • /
    • pp.65-89
    • /
    • 2014
  • Although many studies have focused on the influences and outcomes of personal information leakage, few studies have investigated how the personal information leakage prevention behavior differs depending on internet user. This study attempts to supplement the existing studies' limitations with the use of risk perception attitude (RPA) framework. More specifically, this study tries to show internet user can be classified into four groups based on perceived risk of personal information leakage and efficacy beliefs of personal information protection, and to identify how the groups differ in terms of motivation, information seeking, and behaviors for privacy leakage prevention. Analysis on survey data from 276 internet users reveals that the users can be classified into responsive, avoidance, proactive, indifference groups. Furthermore, there are differences between groups in terms of motivation, information seeking, and behaviors for personal information leakage prevention. This study contributes to expand existing literature by providing tailored guidelines for implementation of personal information protection strategies and policy.