• Title/Summary/Keyword: use of information

Search Result 31,499, Processing Time 0.053 seconds

A Study on the Factors Affecting the User Satisfaction and Continuous Use Intention of the Improved Army Tactical Command Information System (ATCIS 성능개량체계 만족 및 지속사용 의도에 미치는 영향요인)

  • Lee, Tae Bok;Baek, Seung Nyoung
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.1-24
    • /
    • 2022
  • Purpose The purpose of this study is to investigate the factors that affect the user satisfaction and continuous use intention of the improved ATCIS in the Korean Army. Design/methodology/approach Based on the various theories in relation to IT continuance, user satisfaction was identified as the main factor with regard to the continuous use intention of the improved ATCIS. In addition, computer self-efficacy, education-training, and system quality were hypothesized as antecedent variables to user satisfaction, and information security stress was set as a moderating variable for these relationships. Findings Survey results show that computer self-efficacy, education and training, and system quality had a positive effect on user satisfaction, and information security stress was found to moderate these relationships. The effects of computer self-efficacy and education-training on user satisfaction were higher in the group with low information security stress. However, the relationship between system quality and user satisfaction was higher in the group with high information security stress. User satisfaction is found to have a positive effect on the continuous use intention even with habit considered as a control variable.

An Investigation of the Awareness and Use of Open Access Initiative at the Federal Polytechnic, Offa, Kwara State, Nigeria

  • Issa, A.O.;Igwe, K.N.;Akangbe, B.R.;Aliyu, M.B.
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.3
    • /
    • pp.55-65
    • /
    • 2014
  • This study investigated the information environment of lecturers in Federal Polytechnic, Offa, Kwara State, Nigeria, in relation to their information seeking behavior, extent of use of the polytechnic library, perceptions of the resources and services of the library, level of awareness and extent of use of the open access model of scholarly communications, as well as the challenges of accessing and using information resources. It adopted the survey research method, using a questionnaire for data collection, while the descriptive statistics method was used to analyse the data, using tabular presentation and simple percentages. From a population of 280 lecturers for the study, a purposive sample of 164 was drawn. The findings showed that the lecturers' information needs are focused on online use; they hardly use the polytechnic library due to their perceptions of the resources and services of the library. They are, to a greater extent, aware of open access initiatives, but do not publish in open access outlets, while various challenges affect their access and use of information resources for teaching and research. A recommendation was made, among others, that the polytechnic management should pay more critical attention to the library especially in the areas of adequate, current and comprehensive collections on all the programmes of the institution, as well as the provision of wireless internet services on the campus through a public-private partnership arrangement.

OBJECT-ORIENTED CLASSIFICATION AND APPLICATIONS IN THE LUCC

  • Yang, Guijun
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1221-1223
    • /
    • 2003
  • With speediness of economy, the structure of land use has taken lots of change. How can we quickly and exactly obtain detailed land use/cover change information, and then we know land resource amount, quality, distributing and change direction. More and more high resolution satellite systems are under development. So we can make good use of RS data, existed GIS data and GPS data to extract change information and update map. In this paper a fully automated approach for detecting land use/cover change using remote sensing data with object-oriented classification based on GIS data, GPS data is presented (referring to Fig.1). At same time, I realize integrating raster with vector methods of updating the basic land use/land cover map based on 3S technology and this is becoming one of the most important developing direction in 3S application fields; land-use and cover change fields over the world. It has been successful applied in two tasks of The Ministry of Land and Resources P.R.C and taken some of benefit.

  • PDF

A Study on the Factors Influencing Mobile Service Usage (모바일 서비스 사용의 영향 요인에 관한 연구)

  • Moon Hyun-Pil;Ok Seok-Jae
    • The Journal of Information Systems
    • /
    • v.14 no.2
    • /
    • pp.133-154
    • /
    • 2005
  • The objective of this study is to find the factors influencing the use of mobile service. We extracted critical study variables according to literature reviews about adoption of information systems, those under the internet environment and mobile internet adoption for theoretical foundation. TAM suggested by Davis(1985) has explained the acceptance mechanism with the following constructs: perceived usefulness, perceived ease of use, attitude toward use, behavioral intention and actual usage. After studying prior literature reviews, this study investigated the group of people using mobile services. The result of study claims that it has same results with previous TAM, especially between personal innovativeness and attitude toward use have strong statistical relations. On the other hand, there haven't been any statistical relations between perceived ease of use and perceived usefulness and between perceived usefulness and behavioral intention, either. In conclusion, use of mobile service can be promoted by developing various kinds of mobile service, designing device and interface to use mobile service more convenience and familiar, stimulating user's innovative characters and recognizing mobile service more useful in real life.

  • PDF

Learning with information in an infomration-rich environment (풍부한 정보 환경에서 정보와 함께 하는 학습: 인지기술 활용을 중심으로)

  • Chung, Jin-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.4 s.50
    • /
    • pp.135-158
    • /
    • 2003
  • The Purpose of this study is to investigate how information use contributes to learning. Conducted as part of a larger study, this study focuses on learning by analyzing students' use of cognitive skills during the Process of using information. Within the broad methodological framework of qualitative research in constructivist paradigm (Guba and Lincoln, 1998), the study applied the revised Bloom's taxonomy (Anderson and Krathwohl, 2000) as a particular framework to understand the Phenomenon. Participants included 21 high school juniors in an honors' class of persuasive speech. The study's combinational use of two techniques -concept mapping and individual interview - in a naturalistic setting Proved to be the unique methods for researching the reflection of information use in learning Products. The results revealed that changes in students' understanding occured in four types - simple, analytic, organizational, and holistic changes. The analysis using the revised Bloom's taxonomy showed that a variety of cognitive skills were used during the whole process of information use and that the use of higher levels of cognitive skills is particularly crucial.

Dynamic State Changes between Temporary Non-Use and Use: Approached by Grounded Theory Methodology (일시적 비사용과 사용 간의 동태적 상태 변화에 대한 연구: 근거이론방법론에 의한 접근)

  • Lee, Woong-Kyu
    • The Journal of Information Systems
    • /
    • v.28 no.4
    • /
    • pp.359-375
    • /
    • 2019
  • Purpose The purpose of this study is to investigate the nature of temporal non-use, namely, the type of temporal non-use and the dynamic relationships between temporary non-use and use by expanding the model of dynamic state transition of non-use which is proposed by the previous study. Design/methodology/approach This study adopted grounded theory methodology as a research methodology. Fifteen university students were interviewed for open coding and for selected coding which leads the research model ten students were interviewed. Findings Based on the coding, the types of use were divided into interactive use and one-way use, and the types of temporal use were classified into temporal non-use in which use is intended and temporal non-use in which use is not intended. The dynamic transition model is presented for each type of use and temporalnon-use, and an integrated model that combines them is presented. This study found the following four things: First, all non-use can be temporal Second, there are different types of temporal non-use. Third, the pattern of use is not just one, but new patterns will continue to emerge. Fourth, we found a change in the function of SNS.

A Study on the Information Needs and Behavior of Visually Handicapped (시각장애인의 정보요구 및 이용행태에 관한 연구 - 대구광역시립수성도서관 이용자를 중심으로 -)

  • Oh, Seon-Kyung
    • Journal of Information Management
    • /
    • v.41 no.1
    • /
    • pp.97-126
    • /
    • 2010
  • Many visually handicapped people face difficulties with using libraries. Public libraries are thus required to meet the need of visually handicapped people. Public libraries should guarantee the visually handicapped the right to use appropriate services. If so, the visually handicapped can improve their life quality by decreasing information gap and increasing information comprehension or accessibility. This study is designed to analyze how visually handicapped people can use public libraries. Based on the analysis, this study can provide actual suggestions to improve opportunities for the visually handicapped to use libraries. Data are collected from visually handicapped people who are the members of Suseong Public Library, Daegu, Korea. In specific, this study can analyze various characteristics(i.e., information needs, selection and use behavior of information sources, difficulties and gaps to access information, use behavior and service satisfaction of public library) regarding their library use by telephone interviews.

An Empirical Study on the Factors that Affect the Continuous Use Intention of i-PIN (아이핀(i-PIN)의 지속적 사용의도에 영향을 미치는 요인에 관한 실증적 연구)

  • Im, Hyuk;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.159-179
    • /
    • 2015
  • In 2005, Korean government created the Internet Personal Identification Number (i-PIN) for a new online personal identification system to protect citizens' personal information against criminal abuse. However, i-PINs have not been widely in use over a decade. Although many people joined the i-PIN service, its actual use rate has been low. This study intends to identify the factors necessary to boost the continuous use of i-PINs. It was shown that government support and perceived security had a positive effect on the perceived ease of use and perceived usefulness of the i-PIN, respectively. Perceived security also directly affected the continuous use intention of the i-PIN. The perceived ease of use significantly affected the perceived usefulness, but it did not affect the intention to continuously use the i-PIN. The factor that had the most significant influence on the continuous use intention of the i-PIN was perceived usefulness. To increase the i-PIN use rate, Korean government must reduce users' anxiety through strict security functions, and must attempt to help people use the i-PIN easily.

Proxy based Access Privilige Management for Tracking of Moving Objects

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.225-232
    • /
    • 2022
  • When we drive a vehicle in an IoT environment, there is a problem in that information of car users is collected without permission. The security measures used in the existing wired network environment cannot solve the security problem of cars running in the Internet of Things environment. Information should only be shared with entities that have been given permission to use it. In this paper, we intend to propose a method to prevent the illegal use of vehicle information. The method we propose is to use attribute-based encryption and dynamic threshold encryption. Real-time processing technology and cooperative technology are required to implement our proposed method. That's why we use fog computing's proxy servers to build smart gateways in cars. Proxy servers can collect information in real time and then process large amounts of computation. The performance of our proposed algorithm and system was verified by simulating it using NS2.

The Study of Improvement of Personal Information Leakage Prevention in Mobile Environment (모바일 환경에서 개인정보 유출 방지를 위한 개선 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.53-62
    • /
    • 2015
  • Recently, number of tablet or Smartphone users increased significantly in domestic and around the world. But violation of personal information such as leakage, misuse and abuse are constantly occurring by using mobile devices which is very useful in our society. Therefore, in this paper it will talk about the problems in the network environment of the mobile environment such as tablet and Smartphone, Mobile Malware, hacking of the public key certificate, which could be potential threat to mobile environment. This thesis will research for people to use their mobile devices more reliable and safer in mobile environment from invasion and leakage of personal information. In order to use Smartphone safely, users have to use Wi-Fi and Bluetooth carefully in the public area. This paper will research how to use App safely and characteristic of risk of worm and Malware spreading. Because of security vulnerabilities of the public key certificate, it will suggest new type of security certification. In order to prevent from the information leakage and infect from Malware in mobile environment without knowing, this thesis will analyze the improved way to manage and use the mobile device.