• Title/Summary/Keyword: smartphone use

Search Result 989, Processing Time 0.023 seconds

Analysis of User Preferences for Management and Search Features in E-book Reader Libraries in Smartphone Environments

  • Kim, Mihye
    • International Journal of Contents
    • /
    • v.11 no.4
    • /
    • pp.44-55
    • /
    • 2015
  • There has been a significant paradigm shift in the book industry from print to digital, with the increased use of electronic books (e-books) on e-book readers. The major online booksellers and publishers are devoting their energies to the growth of the e-book market, resulting in an upward spiral in e-book usage, and a resultant increase in the number of downloaded e-books in an e-book reader library. However, there are comparatively few features for e-book management and search in most e-book reader libraries, particularly in smartphone environments. In addition, the user interfaces of e-book management in e-book readers are highly diverse, which has led to major usability issues. In this paper, we analyze user preferences for e-book management and search in the libraries of the five most commonly used e-readers for the Android smartphone platform via a questionnaire survey. Then, we suggest ideal alternatives in addition to user-friendly features based on user preferences for managing e-book libraries, to allow users to more easily browse collections, thereby enhancing the usability of e-book readers.

Security Micro-web Page Based Battlefiled Smart Map (보안 마이크로 웹페이지 기반 전장 스마트 지도)

  • Heo, Jun;Ha, Sunju;Cha, Shin;Eun, Seongbae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.4
    • /
    • pp.259-266
    • /
    • 2017
  • GPS was developed for military purposes. As a result, it is used as a military important means such as guided weapons and strategy / tactics. However, GPS depends on the communication infrastructure and is affected by interference signals. In this paper, we propose a secure micro - web page - based smart map that can enhance security without relying on communication infrastructure on the battlefield. The proposed system consists of general smartphone, security QR, central server and smart map. Only use the network when downloading the security key and SmartMap before the task starts. During operation, the smartphone transmits and receives data using a secure QR. The security QR inserts the security code to prevent forgery and falsification and confirms whether the data is authentic by checking whether the smart phone is forged or not. As a result of implementation, we solved communication security problem of existing technology by using location based service without relying on communication infrastructure.

A Study on the Use of Facet Analysis for Ontology Modeling (온톨로지 모델링에서 패싯 분석 활용 연구)

  • Park, Heejin;Yi, Myongho;Kim, Seonghun;Oh, Sam Gyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.46 no.2
    • /
    • pp.257-287
    • /
    • 2015
  • This study proposes a methodology for using facet analysis in ontology modeling and investigates how facet analysis could be utilized in ontology design processes. We applied facet analysis methods developed by Ranganathan and CRG (Classification Research Group) to modeling Smartphone ontology. Utilizing the guiding principles of Ranganathan and CRG, main facets, such as Type, Spec, Function, Operation, Product, Person, Agent, Space and Time, are derived for Smartphone ontology. It is hoped that the methods and procedures employed in identifying and categorizing facets and ontology in this study will provide insights into designing future ontologies.

The Analysis of Equaizer for Improving Sound Quality of Samrtphones (스마트폰의 음질 향상을 위한 Equalizer 분석)

  • Lee, Myung-hwan;Ryu, Chang-su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.190-193
    • /
    • 2013
  • Before Smartphone releases, playing music form previous cellphone is very limited, so we need mp3 player instead. However, when Smartphone releases, a function of playing multimedia became one of the important things in Samrtphone including all functions of mp3 player. Even though it is easier to use since you can play music and multimedia in one device, it still has problem issues on the sound quality. This thesis will discuss about functions of EQ from Smartphone music players. After that, we will to achieve high fidelity sound through balance adjustment of Right Mark Audio Analyzer program.

  • PDF

Exploring the Roles of User Resistance and Social Influences on Smartphone Acceptance and Continuous Usage (스마트폰 채택 및 지속사용에 있어 사용자 저항과 사회적 영향력의 역할에 대한 탐색연구)

  • Choi, Sae Sol;Yoo, Jae Heung
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.4
    • /
    • pp.41-59
    • /
    • 2012
  • This study examines the roles of user resistance and social influences on the acceptance and continuous usage of smartphones at different stages of adoption. The respondents were classified into three groups according to their innovation adoption stage : non-user group, the potential user group and the trial user group. Theories relevant to user resistance, social influences including normative social influences and informational social influences, as well as user adoption and continuance behavior were reviewed and integrated into our research model. In order to verify the proposed structured equation model, we conducted an online survey by targeting mobile phone users and collected data to be analyzed through a partial least squares (PLS) test. This study tested whether there exists differences in the effects of user resistance and different types of social influence on user's adoption or continuance intetion among these three groups. The results showed that user resistance exists in all adopter groups and that it has significant negative influences on intention to use a smartphone. The findings also revealed that user resistance can be enhanced or resolved by two types of social influence; informational social influence resolves user resistance regardless of the adopter category, while normative social influence enhances the user resistance of potential users. Furthermore, the findings show that social influence regardless of the type positively affects user intention. Several theoretic and practical implications pertaining to the results are discussed.

The Infant and Child Growth Assistance System Based on a Smartphone

  • Byun, Ki-Won;Kang, Joon-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.8
    • /
    • pp.95-103
    • /
    • 2016
  • Food habit forming the basis for a lifetime of food and nutrient intake is established in early childhood and has an effect to the child's growth, sociality, and obesity. A variety of nutrition screening tools exists for assessing the health and nutrition status of children such as the Growth Curve, for determining if growth is appropriate. Body mass index(BMI) as a more reliable index of overweight to prevent childhood obesity, and Nutrition Quotient(NQ) and eating behaviors questionnaire for young children and parents to estimate their nutrient intake adequate or not. Such tools are mainly used by health practitioners, such as doctor and dietitian to provide nutrition intervention services to children at risk, especially and are not easy to use for general parents, who need assessment at any time and at any place. We propose Growth Assistance System for infants and children, which is possible to assess their physical condition, nutritional status, and eating behavior integrated. To be convenient and portable, it is implemented over the smartphone as an application. The system offers the growth charts, the BMI curves, NQ and eating behavior questionnaire to take a monitoring and the functionalities operate well. We hereby expect this system support the normal growth and development of infants and young children. And also support for the health practitioner (dietitians and nutritionists) to take a role in providing nutrition counseling and education to children needing nutrition services.

A Study on the Functional Factors, Advertising Effect, and Satisfaction of Smartphone-based Shopping Brand App UI (스마트폰 기반 쇼핑 브랜드앱 UI의 기능적요인, 광고효과, 만족 관계에 관한 연구)

  • Yoon, Hyewon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.5
    • /
    • pp.97-105
    • /
    • 2020
  • As smartphone app use and untact consumption activities become more common, a new consumption environment is starting. The purpose of this study is to measure preference and brand trust as an advertising effect through experience of UI functional factors of shopping brand app and to establish causal structural relationship to satisfaction.Based on theoretical research, the research model was set and the data of 223 people collected in the survey were analyzed using the SPSS 25.0 program.App UI functional factors partially affect advertising effects, and advertising effects have been found to affect satisfaction. This could provide basic research on marketing communications for brand shopping apps.

Influence of Privacy Concerns on Intention to Use Location-based Services Based on Privacy Calculus Perspective (프라이버시 계산 관점에서 위치기반서비스 이용의도에 대한 프라이버시 염려의 영향)

  • Kim, Jongki
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.265-272
    • /
    • 2017
  • As Location-based services on smartphone are getting more popular, users have more concern on exposing their location information. This study developed a research model to identify how smartphone users perceive on providing information pertaining to their location based on privacy calculus theory. 203 responses were analyzed with SmartPLS 2.0. The outcome of this research is quite interesting because conventional belief of privacy calculus perspective does not hold. The privacy calculus theory is based on assumption that human being is rational and decision to provide privacy information is determined by risk and benefit aspects. However, the result of this study is in accordance with behavioral economics perspective in which emotional judgment and behavioral judgement are affected by different factors.

Design and Implementation of Remote Control System for Car Navigation (자동차 내비게이션 원격 제어 시스템의 설계 및 구현)

  • Shin, Yejin;Seol, Soonuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1695-1703
    • /
    • 2014
  • Manipulating a car navigation system while driving can lead to car accident due to loss of concentration. This will be more serious for elders or beginner drivers. Recently, a new Road Traffic Law in Korea prohibits drivers from watching or operating any video displaying devices. So the car navigation system came hard to use. In order to solve the issue we design and implement a novel system where a remote person can control the car navigation system on behalf of the driver. In the proposed system, we suggest to utilize the driver's smartphone for allowing sharing the Internet connection of the phone with the navigation system. The required smartphone application and the server will also be designed and implemented.

A Study on The Improvement of User Authentication using the Facial Recognition and OTP Technique in the Mobile Environment (모바일 환경에서 OTP기술과 얼굴인식 기술을 이용한 사용자 인증 개선에 관한 연구)

  • Huh, Seung-Pyo;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.75-84
    • /
    • 2011
  • With the rapid development of mobile technology the use of smartphone is spreading. In order to activate mobile banking and market in the future, the most important key is a secure financial transactoin. However, because many apps are developed without security check in proportional to the spread of smartphone, security threat is inevitably high. Current smartphone banking is processed as the way of the existing public certificate or OTP technique in the mobile environment, but many security hole about current technology is pointed out steadily. Therefore, in this paper we are to improve a existing security hole by reinforcing the security through multi-factor authentication and providing a physical non-repudiation.