• Title/Summary/Keyword: mobile phone use type

Search Result 64, Processing Time 0.025 seconds

Exploring the Roles of User Resistance and Social Influences on Smartphone Acceptance and Continuous Usage (스마트폰 채택 및 지속사용에 있어 사용자 저항과 사회적 영향력의 역할에 대한 탐색연구)

  • Choi, Sae Sol;Yoo, Jae Heung
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.4
    • /
    • pp.41-59
    • /
    • 2012
  • This study examines the roles of user resistance and social influences on the acceptance and continuous usage of smartphones at different stages of adoption. The respondents were classified into three groups according to their innovation adoption stage : non-user group, the potential user group and the trial user group. Theories relevant to user resistance, social influences including normative social influences and informational social influences, as well as user adoption and continuance behavior were reviewed and integrated into our research model. In order to verify the proposed structured equation model, we conducted an online survey by targeting mobile phone users and collected data to be analyzed through a partial least squares (PLS) test. This study tested whether there exists differences in the effects of user resistance and different types of social influence on user's adoption or continuance intetion among these three groups. The results showed that user resistance exists in all adopter groups and that it has significant negative influences on intention to use a smartphone. The findings also revealed that user resistance can be enhanced or resolved by two types of social influence; informational social influence resolves user resistance regardless of the adopter category, while normative social influence enhances the user resistance of potential users. Furthermore, the findings show that social influence regardless of the type positively affects user intention. Several theoretic and practical implications pertaining to the results are discussed.

DDoS Attack Application Detection Method with Android Logging System (안드로이드 로깅 시스템을 이용한 DDoS 공격 애플리케이션 탐지 기법)

  • Choi, Seul-Ki;Hong, Min;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1215-1224
    • /
    • 2014
  • Various research was done to protect user's private data from malicious application which expose user's private data and abuse exposed data. However, a new type of malicious application were appeared. And these malicious applications use a smart phone as a new tools to perform secondary attack. Therefore, in this paper, we propose a method to detect the DDoS attack application installed inside the mobile device using the Android logging system.

Effects of Self Message Type and Incidental Pride Type on Product Purchase Intention (제품의 구매의도에 대한 자아 메시지의 유형과 환경적 프라이드의 유형의 효과)

  • CHOI, Nak-Hwan
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.10
    • /
    • pp.53-65
    • /
    • 2019
  • Purpose - Current study aimed at investigating the effects of the choice easiness as a thought triggered at the time of making decision and the goal achievement emotion as a prediction of how consumers feel in the state of achieving consumption goal on brand purchase intention. And It also explored moderation role of incidental pride type such as ambient hubris pride and ambient authentic pride felt before the event in the effects of message type such as self-verifying message and self-enhancing message on the choice easiness and the goal achievement emotion. Research design, data, and methodology - Message type was divided into self-verifying message and self-enhancing message. Incidental pride type was divided into hubris and authentic pride. Smart mobile phone was selected for empirical study. And the experiment was performed with 2(pride type: hubristic versus authentic) × 2(message type: self-verifying message versus self-enhancing message) between-subjects design. Questionnaires from 215 undergraduate students were used to test hypotheses by Macro process model 7. The hypotheses were tested at each of self-verifying message group and self-enhancing message group. Results - First, both choice easiness and goal achievement emotion positively influenced on the purchase intention at both self-verifying message group and self-enhancing message group. Second, at self-verifying message group, the positive effects of self verification on both choice easiness and goal achievement emotion were higher to the customers under incidental hubris pride than to those under incidental authentic pride customers. Third, at self-enhancing message group, the positive effects of self enhancement on goal achievement emotion were higher to the customers under incidental authentic pride than to those under incidental hubris pride. However, at self-enhancing message group, the positive effects of self enhancement on choice easiness (goal achievement emotion) were not higher (higher) to the customers under incidental authentic pride than to those under incidental hubris pride. Conclusions - Focusing on the results of this study, to promote their brand purchase intention, brand managers should use self-enhancing message to induce goal achievement emotion from incidental authentic pride customers. And the brand managers should develop and use self-verifying message to induce choice easiness as well as goal achievement emotion from hubris pride customers, which in turn, promote their brand purchase intention.

Development and Validation of Reverberation Chamber Type Whole Body Exposure System fer Mobile Phone Frequency (이동전화 주파수에 대한 전자파 잔향실 형태의 전신 노출장치 개발 및 유효성 평가)

  • 정기범;고경배;도현정;백정기;정연춘;최재훈
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.3
    • /
    • pp.291-300
    • /
    • 2004
  • Due to the rapid growth of mobile communication services, many studies have been performed on the biological effects of EMF(Electromagnetic field) exposure. However, it is not easy to create the field uniformity in radio frequency. To overcome this difficulty, the electric field and SAR(Specific Absorption Rate) distribution is developed to measure the whole body exposure system. In this paper, we developed the whole body exposure system for in-vivo study utilizing reverberation chamber which has a high possibility of practical use by substituting previous the EMC chamber. The field uniformity in the test area of the designed reverberation chamber was satisfied by the simulation and measurement data. In animal study of the whole body exposure for a mouse, the results of FDTD simulation were compared with those of measurement to confirm SAR under the electromagnetic exposure. We analyze the electric field distribution in the interior of the reverberation chamber and treat these results in statistical manner. In the CDMA frequency band(PCS & Cellular band), an average value of the whole body SAR and local peak value for a experimental mouse were presented for various input power.

A Literature Review on Sound Therapy for Tinnitus (이명의 소리치료에 대한 문헌 고찰)

  • Eun Kyung Lee;Hye Yeon Ko;Min Hee Kim
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.36 no.2
    • /
    • pp.45-59
    • /
    • 2023
  • Objectives : The purpose of this study is to analyze the various methods of sound therapy(ST) applied to tinnitus patients and their effectiveness, and to suggest an effective method that can be applied in clinical settings. Methods : Studies published from January 2018 to March 2023 were searched on 5 databases(Pubmed, RISS, OASIS, KISS, KCI). All RCTs that applied sound therapy as a main treatment method were included. Results : 14 studies were included. In 13 studies, sound therapy was statistically significant in improving tinnitus. Basic sound therapy was used in 6 studies(42%), followed by tinnitus rehabilitation therapy(TRT)(n=5, 35%). White noise(n=11, 75%) and nature sound(n=4, 28%) were the most frequently used sound sources. In the case of intensity, mixing point were the most common with 6 studies(42%). The mobile application(n=4) was the most frequently used implement. The application time of sound therapy per day was more than 3 hours(n=7), and the total treatment period was more than 3 months(n=9). Conclusions : Our findings indicate that sound therapy could be considered as an intervention for tinnitus patients. For better use, we suggest a basic type of sound therapy or TRT using white noise or nature sound at the mixing point level provided as a mobile phone application. In addition, the treatment period is recommended to be more than 3 hours/day for 3 months.

A Comparative Study of Users' Behavior on Mobile Internet Service Usage according to Lifestyle (라이프스타일 유형별 모바일 인터넷 사용형태 비교 연구)

  • Choi, Hun
    • Management & Information Systems Review
    • /
    • v.30 no.1
    • /
    • pp.87-105
    • /
    • 2011
  • Although the rapid spread of mobile device like smart phone has increased, One of the main problems of systems is that they do not meet their quality requirements. Many researchers have tried to improve users' satisfaction and enhance their quality of life. The purpose of the study is to examine the moderating effect of lifestyle on the use of mobile internet service. To achieve our research purpose, we used lifestyle, IS success model and quality of life as the theoretical background. Based on the research model, we conducted survey and empirically analyzed the data. We classified user types according to lifestyle as a moderating variable. The results show that users' lifestyle can classify two group: curiosity-independent group and intelligence-pursuit of advanced fashion type. The impact of information and systems quality factors of mobile internet service on user satisfaction are differentiated from these lifestyle group. This paper ends with strategical implication of the study results.

  • PDF

Transmission Performance of Application Service Traffic on MANET with IDS (IDS가 있는 MANET에서 응용 서비스 트래픽의 전송 성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.584-587
    • /
    • 2012
  • MANET, which can be constructed with only terminal devices, has structural advantages of ease installation and operation, also has environmental change of rapid supply of smart phone, it's usage can be extended to application area likes as emergency communication, leasure, exploration and investigations. But, as one characteristic of MANET, no use of communicaton infrastructure caused disadvantage of weakness for information intrusion which is frequently occurred, nowadays. In this paper, the effects of IDS(Intrusion Detection System), one of defence tools for information intrusion, is analyzed for transmission performance. Blackhole attack is assumed as a type of intrusion, MANET defence with IDS from intrusions. Computer simulation based on NS-2 used for performance measurement. In this paper, performance measurement is done for application service to analyze application level effects of IDS. VoIP service is used as application service.

  • PDF

Study of an Accurate and Efficient Data Integration for Decision Making in Data Management of Ubiquitous (유비쿼터스 데이터 관리에서 의사결정을 위한 정확하고 효율적인 데이터 통합 연구)

  • Lee Hyun-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.145-151
    • /
    • 2006
  • In conjunction with the rapid progress of IT(information technology) an increasing amount of data are being generated. The amount of new data is so big and the type of new data generated from clients or sensor devices needed to be in ubiquitous environment is so various that it is hard to manage and control them. Especially data to be occurred in ubiquitous environment are generated through PDA(personal digital assistant) smart phone, mobile device or sensor units etc. Therefore, to manage and control them generated from ubiquitous devices for decision making, we can use data warehouse as an integrated storage. A data warehouse integrates and aggregates data of several different DBMS into one DBMS. Also the updated data from source data have to be effectively propagated to the data warehouse. Therefore, in this paper, we proposed a mode) for an exact and efficient data management methodology in new IT paradigm environment, ubiquitous computing environment, to apply updated data on the warehouse to make decision. We also show brief result compared to conventional methodology.

  • PDF

Cloud Platform for Smartfarm (스마트팜을 위한 클라우드 플랫폼)

  • Lee, Meong-hun;Yi, Se-yong;Kim, Joon-yong;Yoe, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.496-499
    • /
    • 2016
  • The smartfarm is a leader in the Field of environmental monitoring in agriculture. By the use of wireless remote systems, monitoring applications of the smartfarm are able to provide vital information to the farmer wherever he may be. Absentee farmers are finding the ease of viewing the application graphs on their mobile phone is providing them with peace of mind. We design system and technical requirements of service for managing and operating smart-farm based on cloud technology. It describes requirements of cloud technology for monitoring, controlling, managing, and operating cloud-based smart farm. Smart farm system and service with cloud platform contains 3 interfaces and 3 services. In addition, smart-farm using cloud platform could have several cases so it should be established and managed in varying way depending on cultivars, its size and type. This paper will focus the industry's attention on the importance of Open/Standard Cloud platform thereby stimulating the smartfarm in agriculture.

  • PDF

Blockchain-based safety MyData Service Model (블록체인 기반 안전한 마이데이터 서비스 모델)

  • Lee, Kwang Hyoung;Jung, Young Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.873-879
    • /
    • 2020
  • The importance of data as a core resource of the 4th industrial revolution is emerging, and companies illegally collect and use personal data. In the financial sector, active research is conducted to safely manage personal data and provide better services using blockchain, big data, and AI technology. In this paper, we propose a system that can safely manage personal data by using blockchain technology, which can be used without changing the existing system. The composition of this system consists of a blockchain, blockchain linkages, a service provider, and a user (i.e., an app). Blockchain can be used regardless of its type and form, and services are provided by classifying blockchains and services in the blockchain linkages. Service providers can access personal data only after requesting and receiving delegated permission from users. Existent MyData services store all data in a user's mobile phone, so information may get leaked due to jailbreaks or rooting. But in the proposed system, personal data are stored in blockchain so information leakage can be prevented. In the future, we will study ways to provide customized services using personal data stored in blockchain.