• Title/Summary/Keyword: user behaviors

Search Result 548, Processing Time 0.028 seconds

A Study on User's Behaviors and Environmental Analysis of University Dining facilities - Focused on K University Dining Facilities by the Post Occupancy Evaluation - (대학 학생식당의 이용실태 및 환경분석에 관한 연구 - K대학 학생식당의 거주후 평가를 중심으로 -)

  • 김성기
    • Korean Institute of Interior Design Journal
    • /
    • no.38
    • /
    • pp.164-172
    • /
    • 2003
  • The purpose of this study is to analyze user's behaviors and environmental image to show how to plan dining facilities by checking what factors make user's satisfaction and how inferior factors effect dining people. The spaces in this study are dining facilities in a University. Dining places are campus welfare facilities, students don't have other choice. Dining facilities are determined according to user's desire to convenience and time saying. And this facilities will be compliment to resting places in campus. As we know, functional planing facilities are central element in University Master Plan and must consider interior decoration, surrounding places and some other instruments. Scale of dining facilities must accommodate with many students, therefore dining facilities can served as spare place and resting space.

An Interface Technique for Avatar-Object Behavior Control using Layered Behavior Script Representation (계층적 행위 스크립트 표현을 통한 아바타-객체 행위 제어를 위한 인터페이스 기법)

  • Choi Seung-Hyuk;Kim Jae-Kyung;Lim Soon-Bum;Choy Yoon-Chul
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.9
    • /
    • pp.751-775
    • /
    • 2006
  • In this paper, we suggested an avatar control technique using the high-level behavior. We separated behaviors into three levels according to level of abstraction and defined layered scripts. Layered scripts provide the user with the control over the avatar behaviors at the abstract level and the reusability of scripts. As the 3D environment gets complicated, the number of required avatar behaviors increases accordingly and thus controlling the avatar-object behaviors gets even more challenging. To solve this problem, we embed avatar behaviors into each environment object, which informs how the avatar can interact with the object. Even with a large number of environment objects, our system can manage avatar-object interactions in an object-oriented manner Finally, we suggest an easy-to-use user interface technique that allows the user to control avatars based on context menus. Using the avatar behavior information that is embedded into the object, the system can analyze the object state and filter the behaviors. As a result, context menu shows the behaviors that the avatar can do. In this paper, we made the virtual presentation environment and applied our model to the system. In this paper, we suggested the technique that we controling an the avatar control technique using the high-level behavior. We separated behaviors into three levels byaccording to level of abstract levelion and defined multi-levellayered script. Multi-leveILayered script offers that the user can control avatar behavior at the abstract level and reuses script easily. We suggested object models for avatar-object interaction. Because, TtThe 3D environment is getting more complicated very quickly, so that the numberss of avatar behaviors are getting more variableincreased. Therefore, controlling avatar-object behavior is getting complex and difficultWe need tough processing for handling avatar-object interaction. To solve this problem, we suggested object models that embedded avatar behaviors into object for avatar-object interaction. insert embedded ail avatar behaviors into object. Even though the numbers of objects areis large bigger, it can manage avatar-object interactions by very efficientlyobject-oriented manner. Finally Wewe suggested context menu for ease ordering. User can control avatar throughusing not avatar but the object-oriented interfaces. To do this, Oobject model is suggested by analyzeing object state and filtering the behavior, behavior and context menu shows the behaviors that avatar can do. The user doesn't care about the object or avatar state through the related object.

Mobile IP User Mobility Model for Effective Mobility Management Accommodating Heterogeneous Networks under Cognitive Networking Environments (이종 네트워크간의 효과적 이동성 수용을 위한 이동 IP 네트워크 사용자 이동성 모델)

  • Cheon, Eun-Ji;Kim, Jeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.6
    • /
    • pp.90-97
    • /
    • 2012
  • In this paper, the new user mobility model which can be utilized to register user's location for interworking with heterogeneous overlay convergent networks under the time-varying radio propagation environment has been proposed. Thus the user mobility model is considered in order to evaluate the behaviors of users in the overlay convergent networks. This Mobile IP user mobility model will be very useful to model the user mobility behaviors and can be used to estimate the signaling traffic and frequency spectrum demands for massive data transfer for the heterogeneous overlay convergent networks.

A Study on Public Libraries' User Behaviors Based upon Circulation Data in Gangseo and Yangcheon Region (대출기록을 통해 본 공공도서관 이용자 연구 - 강서·양천지역을 중심으로 -)

  • Heo, Sun;Chung, Yeon Kyoung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.4
    • /
    • pp.187-207
    • /
    • 2014
  • Public library user studies are required for better services and circulation records can be used as specific library data to identify common user patterns of the libraries. This study examined 754,198 of circulation data set - number of users, frequencies of circulation, volume of time of circulation and etc. The results of this study indicate the possibility of using circulation data to analyze the usage patterns in public libraries and to provide major types of users, collections, time of circulation, and common library user behaviors for better public library services.

A Case Study on E-Journal Usage of Undergraduate Students (대학생의 전자저널 이용 활성화 방안 - D대학교 사례를 중심으로 -)

  • Lee, Lan-Ju;Jang, Un-Bie
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.2
    • /
    • pp.187-207
    • /
    • 2012
  • The purpose of this study is to examine the usage and user behaviors of undergraduate students and to suggest the ways to promote the usage of e-journals. The methods used in this study are survey questionaires and interviews who are taking a general education course or Library and Information Science courses offered in D University. The study collected the data regarding usage, user behaviors, service quality, user instructions and advertisement of e-journals. In addition, the study analyzed the library website and interviewed librarians. Based on the findings, the study suggested the ways to improve the level of e-journal usage.

Internet Addiction and Health Behaviors & Mental Health among Adolescents - The 2010 Korean Youth Risk Behavior Web-based Survey (청소년의 인터넷중독과 건강행태 및 정신건강 요인 - 2010년 청소년건강행태온라인조사 자료를 이용하여)

  • Kim, Dae-Hwan
    • Korean Journal of Health Education and Promotion
    • /
    • v.30 no.2
    • /
    • pp.1-10
    • /
    • 2013
  • Objectives: The objective of this study was to assess the relationship between internet addiction and health behaviors & mental health among Korean adolescents. Methods: Data from the 2010 Korean Youth Risk Behavior Web-based Survey was analyzed. Using the Korean Internet Addiction Proneness Scale for Youth-Short Form: Self Report developed by the Korean National Information Society Agency in 2008, subjects were classified into 3 groups for internet addiction including general user, potential-risk group, and high-risk group. The health behaviors and mental health were compared among the groups for internet addiction by gender. Results: There was significantly higher prevalence of internet addiction including potential-risk group and high-risk group in boys(14.1%) than in girls(8.8%). There were significant odds ratios of perceived stress, perceived depression, perceived health and happiness, and satisfaction of sleeping in both genders at potential-risk group and high-risk group compared to general user for the internet addiction. The odds ratios of smoking at high risk group, alcohol drinking at potential risk group, eating breakfast at high risk group, and moderate physical activity at both risk groups among boys were significant. Among girls at both risk group, the odds ratios of smoking, alcohol drinking, and eating breakfast were significant. Conclusions: This study reveals a significant association among internet addiction, and health behaviors, and mental health in Korean adolescents.

A Study on the Information Use Behaviors of Researchers in the Field of Business Administration for Improving Information Services (정보서비스 개선을 위한 경영학분야 연구자의 정보이용행태에 관한 연구)

  • Lee, Lan-Ju;Kim, Su-Jin
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.1
    • /
    • pp.279-302
    • /
    • 2015
  • The purpose of this study is to analyze researchers' information use behaviors in the field of business administration in order to provide library services based on user information needs. The methods of this study targeted the members of K Society in the business administration field, and employed user survey using a web-based questionnaire. A total of 202 users answered the questionnaire. The questionnaire focused on items such as by age and status, general information use, electronic resources use, SNS and mobile services information use, library and information center use, and specialized business administration library use. The results of this study suggested improving several library services.

An Empirical Study about Internet and Social Network Security Behavior of End User (최종사용자의 인터넷과 소셜 네트워크 보안 행동에 대한 실증 연구)

  • Park, Kyung-Ah;Lee, Dae-Yong;Koo, Chul-Mo
    • The Journal of Information Systems
    • /
    • v.21 no.4
    • /
    • pp.1-29
    • /
    • 2012
  • The purpose of this study was to find about personal information security of internet and social networks by focusing on end users. User competence and subjective criterion, which are the antecedents, are affecting security behaviors For these security behaviors, the study examined the relationship between security behavior intention on internet use and security behavior intention about social network that is actively achieved in many fields. Behaviors of internet and social network were classified into an action of executing security and an action of using a security technology. In addition, this study investigated a theory about motivational factors of personal intention on a certain behavior based on theory of reasoned action in order to achieve the purpose of this study. A survey was conducted on 224 general individual users through online and offline, and the collected data was analyzed with SPSS 12.0 and SmartPLS 2.0 to verify demographic characteristics of respondents, exploratory factor analysis, and suitability of a study model. Interesting results were shown that security behavior intention of social network is not significant in all security behavior execution, which is security performance behavior, and security technology use. Internet security behavior is significant to security technology use but it does not have an effect on behavior execution.

User Mobility Management Scheme for Effective Inter-working with Overlay Convergent Networks (중첩 융합 네트워크에서 효과적 연동을 위한 위치정보 관리방법)

  • Choi, Yu-Mi;Kim, Jeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.6
    • /
    • pp.83-89
    • /
    • 2012
  • In this paper, the new user mobility management scheme which can be utilized to register user's location for interworking with heterogeneous overlay convergent networks under the time-varying radio propagation environment has been proposed. Thus the user mobility management can be considered in order to model and to evaluate the behaviors of users in the overlay convergent networks. This mobility management scheme will be very useful in characterizing the user mobility behaviors and can be used to estimate the signaling traffic and frequency spectrum demands for massive data transfer for the heterogeneous overlay convergent networks.

Toward User-Oriented University Institutional Repository (이용자 관점의 대학 기관리포지터리에 관한 연구)

  • Lee, Na-Ra;Chung, Eun-Kyung
    • Journal of Information Management
    • /
    • v.43 no.2
    • /
    • pp.85-101
    • /
    • 2012
  • With the understandings on users' needs and behaviors of university institutional repositories, the purpose of this study is to investigate the user behaviors and to provide some suggestions to improve the university institutional repository. To achieve the purpose of this study, a questionnaires survey was conducted with users in three university institutional repositories including KOSAS, S-Space and DSpace@INHA. Based on the results of the survey analyses, possible improvement areas and suggestions were made such as users' recognition, access point, searching environment, and utilization of university institutional repository.