• Title/Summary/Keyword: use for information

Search Result 27,363, Processing Time 0.053 seconds

An Exploratory Study on Maximizing Tendency and Continuance Intention of Web Sites

  • Lee, Gyu-Dong;Lee, Jae-Eun;Sanford, Clive
    • Asia pacific journal of information systems
    • /
    • v.20 no.3
    • /
    • pp.73-90
    • /
    • 2010
  • Although research on acceptance of information systems provides useful insights in understanding users' behavior, we need to further understand factors that cause long-term or continued use. This article therefore examines the role of users' maximizing tendency (i.e., individual differences in pursuing the best option) in continuance intention of Web sites. By controlling for disconfirmation, ease of use, and product involvement, we empirically investigate the relationships between satisfaction, usefulness, and continuance intention to online bookstore Web sites. As suggested by the information technology continuance model, the effects of satisfaction to and perceived usefulness on continuance intention to Web sites are positive for individuals with low maximizing tendency (i.e., satisficers). Satisfaction and usefulness, however, are not associated with continuance intention for individuals with a high maximizing tendency (i.e., maximizers). The implications for both researchers and practitioners are discussed.

Integrated Application Strategies for Natural Disaster Information (자연재해정보의 통합적 활용방안 연구)

  • Yeon, Young-Kwang;Han, Jong-Gyu;Chi, Kwang-Hoon;Ryu, Kun-Ho
    • Economic and Environmental Geology
    • /
    • v.40 no.6
    • /
    • pp.785-795
    • /
    • 2007
  • Recently, the knowledge and use of information production and service in integrated information has been changing from intra-organizational to inter-organizational and even international. In particular, since natural disasters are complexly related, it is increasingly important to use integrated information from related areas in the reduction and prevention of such events. In this study, we suggest strategies for the use of integrated information from natural disasters based on that expanding need. This study analyzes information user surveys, the interrelated information technologies, trends, and case studies to determine user access to the information, the status of the information used, and the supply and distribution of that information. From the survey results, we can draw conclusions about the effectiveness of the strategies of integrated information used in domestic natural disaster information.

Performance Analysis of LAN Interworking Unit for Capacity Dimensioning of Internet Access Links

  • Park, Chul-geun;Han, Dong-hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4B
    • /
    • pp.692-699
    • /
    • 2000
  • We build and analyze some types of queueing model to discuss capacity dimensioning of access links of a LAN interworking unit connected to the Internet backbone network. We assume that the IWU has a FIFO buffer to transmit IP packets to the Internet through the backbone. In order to analyze the system, we use a Poisson process and an MMPP process as input traffic models of IP packets and we use a general service time distribution as a service time model. But we use both an exponential service time and a deterministic service time in numerical examples for simple and efficient performance comparisons. As performance measures, we obtain the packet loss probability and the mean packet delay. We present some numerical results to show the effect of arrival rate, buffer size and link capacity on packet loss and mean delay.

  • PDF

User adaptive media selection based on agent communication

  • Nunokawa, Hiroshi;Ogasawara, Naohito;Sato, Kiwamu;Suguri, Hiroki
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2000.04a
    • /
    • pp.179-183
    • /
    • 2000
  • By spread of Internet, we become to use several of communication such as email, ICQ, VoIP etc. But as become convenient to use, user must be aware of variety of information regarding the media and partner user. The forecast is that this problem grows larger and larger as new media are brought in the expanding communications network. In this research, we suggest an agent MIA (Media Integration Agent) that manages the information instead of user. The MIA is an agent that obtains situation of user, and dynamically exchanged addresses and tendency of using medias in form of vCard. By use of this, user can choose better communication media. Accordingly seamless communication environment that user doesn't have to be aware of various information is formed.

  • PDF

Collective Management Systems of Copyright in the Digital Works (디지털 저작물의 저작권 집중관리제도에 관한 연구)

  • 이두영;홍재현
    • Journal of the Korean Society for information Management
    • /
    • v.13 no.2
    • /
    • pp.189-221
    • /
    • 1996
  • Copyright is challenged by the rapid development of digital technology. This study investigated a number of new copyright-related issues : electrocopying, digital transmission, legal definition of multimedia, moral right, fair use et al. To use copyright works we need licensing of rights and permissions. Then at this paper we examined the scopes and contents of permission with copyright owners or publishers, also considered relationships of copyright owners with distributors and end-users. Finally, to protect rights of copyright owners and use freely copyright works, we suggested introduction of 'collective management system of copyright' and construction of 'copyright management information system' .

  • PDF

A Study on VoIP Information Security for Vocie Security based on SIP

  • Sung, Kyung
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.1
    • /
    • pp.68-72
    • /
    • 2008
  • The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eaves-drop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.

A Study on the Forecasting of Using BIM Long-Term Maintenance Cost Model for Apartment (BIM을 이용한 공동주택 장기수선비용 예측모델 제시)

  • Song, A-Reum;Kim, Ji-Yun;Yun, Seok-Heon
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2013.05a
    • /
    • pp.215-217
    • /
    • 2013
  • The maintenance management in buildings has got more important by the increasing complexity of building sizes and use. Nowadays an expectation and a possibility of BIM technology become accepted as a new construction management method, therefore many studies and legal systems of it are being suggested actively. Although orders for BIM projects are supposed to be increasing, at present the BIM information accumulated from planning and design still doesn't have its continuity at the maintenance step after completion of construction in terms of LCC. It can't use the possibility that BIM originally has, and also causes some confusion in communication. This study analyzes and classifies required information in terms of BIM in the range of estimating repair costs of apartment buildings, as an example of a way to use BIM information at the maintenance step.

  • PDF

Research of method prevent to illegal use of Credit Card (신용카드 부정사용 거래 예방을 위한 대처 방안 연구)

  • Pu, Chang Hee;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.147-156
    • /
    • 2012
  • Most people in our society use credit card instead of cash or check, so credit card is very important economic method. Credit card supposed to be safe, but hackers hack credit card for illegal deal. Also hackers make fake credit card and issue fake credit card to other people. In this thesis it will study and analyze damage case for safe credit card deal. It will use safe credit card system to insert variety of information and data of using pattern in artificial intelligence network, so print out the possibility of risk and monitor the risk of credit card user's deal pattern, so if one of user's pattern is different than normal pattern, it will pop up message in consultant's screen. This thesis will study and suggest way of prevent from illegal deal and user friendly credit card checking system.

A Study on Microblog Service Continuous Use Intention: Focusing on Influence (마이크로블로그 서비스의 지속사용의도에 관한 연구)

  • Kim, Gyung-Jun;Lee, Ho;Son, Soo-Min
    • The Journal of Information Systems
    • /
    • v.23 no.1
    • /
    • pp.73-91
    • /
    • 2014
  • Microblog is emerging as a new communication service because of its usefulness and real-time accessability. Recently, microblog services, such as twitter and me2day in Korea, are getting a great attention. Continuous use intention is critical to sustain the service. However, most recent studies are based on Technology Acceptance Model(TAM) and Expectation Confirmation Model(ECM). These models are only focused on individual factors and overlook social influence factors. Social influence has been indicated as a critical factor of technology adoption and diffusion in social context(Davis, 1989; Fulk et al., 1987). In this study, we explore factors related to social influence which effect on continuous use intention for 'me2day' that is one of the most famous microblog in Korea. The purpose of this study is to understand continuous use intention and examine the relationship among social influence factors, social presence, and continuous use intention. To understand the phenomenon of continuous use intention in microblog service, this study employed social influence theory and expanded it by adding personal network exposure and group norm as additional social influence factors. The results show that social identity, group norms, and social presence positively influences continuous use intention. Contrary to our expectation, personal network exposure does not influence on continuous use intention. Academically, this research can contribute to microblog research field through elucidating the relationship among social influence factors, social presence, and continuous use intention. Although there is not enough research which is considered social influence factors as major explanation for continuous use intention, this study can give novel point of view to understand continuous use intention of microblog. Practically, service providers could consider ways to encourage users to continually use microblog service by reinforcing social influence factors and social presence.

A Study on the Informatization Index of Education for Revitalizing ICT (ICT활성화를 위한 교육 정보화지표 구성에 관한 연구)

  • Park Yoon-Jeong;Han Jeong-Hye;Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.3 no.1
    • /
    • pp.11-22
    • /
    • 2002
  • The purpose of this study was to develop indicators for information and communication technology(ICT) use in elementary education, which are useful tools for forecasting and deciding the policy of education in the society of information technology. We analyzed prior studies on information and communication indicators, and suggested a survey forms to collect data and an equation for each indicator in order to calculate an index from the data without additional survey-cost. They can be intended to be explored on definitions of ICT use in education, indicators for ITC use in elementary education, illustration of utilizing the indicators, and an analysis of differences among schools on the indicators.

  • PDF