• Title/Summary/Keyword: smart mobile device user factor

Search Result 7, Processing Time 0.02 seconds

A Study on the Relationship Between Smart Mobile Devices Use and Work Performances of Public Agencies: Focused on verification of the relationship between performances using TAM (공공기관 근무자의 스마트 모바일기기 사용과 업무성과의 관계에 관한 연구: TAM 모형을 활용한 업무성과와의 관계 검증을 중심으로)

  • Lim, Sung-Jin;Han, Kyeong-Seok;Jung, Mi-Ra
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1465-1474
    • /
    • 2017
  • The study analyzed how the user uses the smart mobile device to assess the effects of the user's acceptance factor and user-factors affecting the work performance of Public Agencies. And Prove that leveraging smart devices can improve your business performance, It was aimed at making strategic recommendations to improve the suitability of smart mobile devices and Tasks. Smart mobile devices User Innovation has affected Usefulness, such as B=.296. p.000, it also affected Perceived Ease-of-Use, such as B=.326, p.000. job fitness has affected Perceived Ease-of-Use, such as B=.261, p.001. Usefulness and Ease-of-Use had a positive affect on work performance. Each of affect on much of B=.382 and B=.488(p.000). At the conclusion, it has been validated that the effects of smart mobile devices user Innovation and job fitness on work performances are mediated by perceived usability and perceived ease of use of the smart mobile device.

Study On Implementation Of Smart Class Based On Mobile uDA And Zigbee Network (Mobile uDA와 Zigbee Network 기반의 Smart Class 구현에 관한 연구)

  • Seo, Jae-Gil;Ahn, Jong-Chan;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.383-386
    • /
    • 2007
  • Under the circumstance of Ubiquitous Society, service should be provided according to the users' location and environment. When specific service is demanded by user, the technology, which can help to detect whether there are devices performing the requested service in the ubiquitous network, is mandatory. This technology also should guarantee that users have the appropriate service through the most suitable device which is selected by this technology. The priority is an essential factor when multi service are asked by multi users simultaneouslyin the ubiquitous network, The paper focuses on realization of Smart Classroom which provides multi users, such as the professor and the students, with active services based on the Zigbee network and the Mobile platform.

  • PDF

A Study on Evaluation for Improving the Usability of Mobile Web User Interface (모바일 웹 사용자 인터페이스의 사용성 향상을 위한 평가에 관한 연구)

  • Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • v.6 no.2
    • /
    • pp.185-199
    • /
    • 2016
  • Smart phone market launched Apple iPhone, and mobile devices having various sizes and operating system began to be enabled. The users search the necessary contents any time and everywhere by a smart phone. And they can use various contents immediately such as information, videos, music etc. Recently, digital devices including mobile has become a large proportion of in everyday life. Therefore, UI/UX which is responsible for the communication between the user and the mobile device is very important. It has been recognized as an important factor for users to determine how easy to use the mobile device. In this paper, it is discussed how to minimize the inconvenience of use while improving the convenience of the UI / UX that make up the mobile web. Then, it is presented an evaluation criteria of Mobile Web UI/UX for improving the usability of the mobile device.

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.

Exploratory Study on Smart Usage of Smartphone Using the Second-order Measurement Model (스마트폰의 '스마트한 이용'에 대한 탐색적 연구 '스마트함', '스마트하다'의 이용행태에 대한 2차 측정모형을 중심으로)

  • Kim, Ki Yoon
    • Korean journal of communication and information
    • /
    • v.74
    • /
    • pp.72-108
    • /
    • 2015
  • The more mobile technology evolves, the more users are trapped in mobile technology by being encouraging the replacement with state-of-the-art technology. However, the use of device is not entirely determined by technology's attributes itself. The meaning of smartness can be varied by 'how users accept and perceive immediate spatial perception from reality to mobile space' without recognizing the boundaries between them. This study focuses on the analysis of 'smart usage' for smartphone and this is verified the concept of 'smart usage' by the second-order measurement model. The result show that the concept organization of 'smart usage' had been differentiated and elicited by the six factors - 'multifunctional use readiness', 'administrative efficiency', 'embedded media', 'device connectivity', 'user-friendly optimization', and 'external connectivity(being connected). According to the conceptual factors, 'smart usage' can be explained in an individual's autonomous ability to control a mobile interface and to utilize a wide range of applications of smartphones.

  • PDF

The Study on Design of Business Paper Editing Product in Ubiquitous Environment (유비쿼터스 환경에서의 비즈니스 문서 편집 기기 디자인에 관한 연구)

  • Ryu, Su-Min;Park, Ji-Hye;Song, Ji-Won
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.424-429
    • /
    • 2008
  • The purpose of this research is to suggest a competitive design by producing functions and elements needed to users based on a research about device use and needs according to user behavior. We proceeded to the research aiming a design smart document-editing device design which can be used for business regardless of place (at office or home), targeting reasonable and individualistic users from twenties to thirties. By some ways for that, first, we selected target users and based on user interviews to get enough understanding for them. Second, we produced user needs by some troubles after establishing persona and deciding target users on the basis of the research. Third, we designed form-factor visualizing work, organized design spec by the produced concept, and we developed interaction design on the basis of this scenario. Fourth, we made paper prototype and conducted user test. As a result, our final design emphasizes mobile ability and simplicity to be suitable for reasonable individualism and is able to efficiently work input, editing, and output without complicated procedure. We could also prove the validity of the design through usability test.

  • PDF

Authentication Algorithm using Random Graphic Code (무작위적인 그래픽 코드를 이용한 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.63-69
    • /
    • 2019
  • Using a smartphone allows quick and easy authentication and payment. However, smartphone security threats are evolving into a variety of new hacking technologies, and are changing to attacks specific to the mobile environment. Therefore, there is a demand for an authentication method suitable for a mobile environment. In order to solve security weaknesses in knowledge-based authentication, many companies provide two-step authentication services such as OTP(One Time Password) to provide authentication services such as finance, games, and login. Although OTP service is easy to use, it is easy to duplicate random number table and has a disadvantage that can be reused because it is used as valid value within time limit. In this paper, we propose a mechanism that enables users to quickly and easily authenticate with high security using the authentication method that recognizes special characters through smartphone's dedicated application.