• Title/Summary/Keyword: user context factors

검색결과 153건 처리시간 0.021초

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

인지적 몰입이 개인의 기술 수용에 미치는 영향: MP3 플레이어에 대한 실증 연구 (The Effect of Cognitive Absorption on the Individual Intention of Technology Acceptance: An Empirical Study on the MP3 Player)

  • 김보연;이상근;강민철
    • Asia pacific journal of information systems
    • /
    • 제16권1호
    • /
    • pp.45-69
    • /
    • 2006
  • Technology Acceptance Model (TAM) has been widely used to predict user's behavior to accept the technology. Prior researches have been mainly focused on innovation constructs such as perceived usefulness and perceived ease of use. However, very little research has been conducted to understand individual mental beliefs in technology acceptance and imitation influence. This study integrates Technology Acceptance Model (TAM), Flow Theory (FT) and Diffusion of Innovation Theory (DIT). This paper indicates that imitation context, cognitive absorption (CA) based Flow theory and innovation context are the three important factors influencing user acceptance of information technologies. The proposed model has been tested among 232 users of MP3 players. Results showed that innovation context and cognitive absorption have positive influences on intention to use technology. Not all factors of the imitation context have direct effect on intention to use. However, we found that imitation context has positive influence on intention to use technology through cognitive absorption.

웹 사용 경험의 정황 요소 매핑에 관한 연구 : 실증적 사례 분석을 중심으로 (Mapping Experiential Context factors on the Website Use Experience : through analysis of practical use cases)

  • 김현정
    • 디자인학연구
    • /
    • 제17권1호
    • /
    • pp.265-276
    • /
    • 2004
  • 사용자 중심 디자인 노력의 일환으로 과거의 사용성(Usabilily)보다 확장된 개념인 사용자 경험(User Experience)을 탐색하고 이를 바탕으로 웹 컨텐츠 플래닝에 활용하기 위한 관심이 확대되고 있다. 특히, 한 웹 사이트에서의 사용자 경험은 이를 둘러싸고 있는 경험적 정황과의 관련성 속에서 이해되고 분석되어야 한다. 그러나, 웹사이트 경험의 정황적 요소에 대해 체계 정립이 이루어지지 않고 있다. 이에 본 논문에서는 웹 사이트 사용에 관련된 정황적 요소를 추출하고 이를 경험의 수준으로 분류하여 매핑함으로써 새로운 웹 컨텐츠 개발을 위한 방법론적 틀을 제시하고자 하였다. 실증적 연구의 대상을 인터넷 음악 방송 사이트 또는 음악 관련 컨텐츠를 이용하는 경험과 이를 둘러싼 경험적 정황으로 정하였으며, 경험적 정황에 대한 이해가 인터넷 음악 방송 사이트와 관련된 컨텐츠 플래닝에 어떻게 영향을 줄 수 있는지 논하였다. 연구 내용은 크게 세가지 부분으로 구성된다. 먼저, 웹 사용의 경험과 경험에 영향을 주는 정황에 대해 문헌 연구를 통해 정의 내리고 체계화하고자 시도하였다. 둘째, 사용자 경험 탐색을 위한 다양한 방법들 - 웹 다이어리 작성, self-video를 통한 사용 화면 기록, 인터뷰 등을 통해 실증적인 사용자 경험 데이터를 수집, 분석하여 정황을 포함한 사용 경험 및 시나리오를 도출하였으며, 이를 통하여 경험적 정황의 요소를 추출하고 매핑하는 과정을 제시하였다. 마지막으로는, 결론에서는 경험적 정황을 포함하는 실증적 사용 시나리오가 웹 컨텐츠 플래닝에 기여할 수 있는 방안에 대해 논하였다. 본 연구는 웹에서의 사용자 경험에 대한 관점을 정황적 요소로까지 확장하고 이를 체계적으로 매핑하는 실증적인 사례를 제시함으로써 웹에서의 혁신적이며 크로스 사이트, 크로스 장르적인 컨텐츠 플래닝의 가능성을 시사하는데 의의가 있다고 하겠다.

  • PDF

모바일 서비스에 기반한 유비쿼터스 컴퓨팅의 사용자 수용에 영향을 미치는 요인 (Factors Affecting User Acceptance of Ubiquitous Computing based on Mobile Services)

  • 노미진;김병곤;박순창
    • Journal of Information Technology Applications and Management
    • /
    • 제18권1호
    • /
    • pp.55-74
    • /
    • 2011
  • The growth in the use of ubiquitous computing based on mobile services as an enabler to conduct business more effectively has been phenomenal. Technology acceptance model (TAM) has been applied in different contexts to examine a wide range of information technologies (IT). As more and more companies are finding ways to utilize ubiquitous computing based on mobile services, an important issue is to understand what factors will impact the decisions of consumers in adopting the services. Based on TAM with three additional groups of external factors, i.e., service-related factors (ubiquitous access, context awareness) and technology-related factors (perceived security risk, network connectivity) that are theoretically justified as having influence on both perceived usefulness and perceived ease of use which are additionally considered, a research model for the investigated technology acceptance was developed and empirically examined, using responses from more than intended users of ubiquitous computing based on mobile services. The specific purposes of this study are as follows. Firstly, this study is to identify service beliefs considering unique characteristics for ubiquitous services such as perceived ubiquitous access and perceived context awareness. Secondly, this study is to investigate network characteristics beliefs such as perceived security and perceived connectivity. Thirdly, this paper investigates the relationship among variables such as ubiquitous characteristics, network characteristics, behavioral beliefs, and intention to use ubiquitous web services. This study uses a structural equation model to test the research model. The major results of this study are as follows. Firstly, ubiquitous access has a influence on perceived usefulness and perceived ease of use. Context awareness has an influence on perceived usefulness. Secondly, User familiarity has an influence on perceived usefulness and perceived ease of use, and intention to use. User innovativeness has an influence on perceived ease of use. Thirdly, perceived security risk has an influence on perceived usefulness and perceived ease of use. Network connectivity has an influence on perceived usefulness and perceived ease of use. Fourth, there exist differential effects among factors in structural model among information, transaction, and entertainment services.

최종사용자 컴퓨팅의 성패 영향요인 연구 (A Study on the Factors Affecting the Success of End-User Computing)

  • 서건수
    • Asia pacific journal of information systems
    • /
    • 제5권2호
    • /
    • pp.259-288
    • /
    • 1995
  • Using end-user attitude as intervening variable, this paper proposes a causal model of how environmental factors of EUC influence end-user computing (EUC) success, measured by the degree of IS use. This study identifies unique aspects of the EUC environment and generates key dimensions of end-user attitude appropriate for this context : perceived information quality, perceived design quality, and perceived usefulness. The research model includes six environmental factors - top management support, end-user education, task variability, task analyzability, end-user's computing ability, and end-user involvement. A field study was undertaken to test the hypothesized relationships among the research variables. The results generally support the assumption that end-user attitude intervene the impact of environmental factors on IS use. The implications of the findings are discussed.

  • PDF

중·저소득 국가의 건강보장제도에서 이용자 부담 도입과 효과: Realist Review 방법을 활용한 탐색적 연구 (The User Fee Introduction and Its Effect in the Health System of Low and Middle Income Countries: An Exploratory Study Using Realist Review Method)

  • 손경복;김창엽
    • 보건행정학회지
    • /
    • 제25권3호
    • /
    • pp.207-220
    • /
    • 2015
  • Background: The purpose of this exploratory study is to explain where, when and how the introduction of user fee system works in low and middle income countries using context, mechanism, and outcome configuration. Methods: Considering advanced research in realist review approach, we made a review process including those following 4 steps. They are identifying the review question, initial theory and mechanism, searching and selecting primary studies, and extracting, analyzing, and synthesizing relevant data. Results: User fee had a detrimental effect on medical utilization in low and middle income countries. Also previous and current interventions and community participation were critical context in user fee system. Those contexts were associated with intervention initiation and recognition and coping strategies. Such contexts and mechanisms were critical explanatory factors in medical utilization. Conclusion: User fee is a series of interventions that are fragile and dynamic. So the introduction of user fee system needs a comprehensive understanding of previous and new intervention, policy infrastructure, and other factors that can influence on medical utilization.

IoT기반의 미래 Workplace를 위한 사용자 경험 디자인 연구 (User Experience Design for future workplace based on IoT)

  • 박남춘
    • 한국HCI학회논문지
    • /
    • 제12권4호
    • /
    • pp.57-64
    • /
    • 2017
  • 사용자 중심의 디자인 패러다임 변화와 사용자 경험 디자인의 부상으로 특정 공간에서의 제품과 서비스에 대한 사용자 경험의 중요성도 증대되었다. 또한 IoT서비스의 등장과 함께 미래 업무환경의 새로운 변화가 예상된다. 본 연구는 미래 업무공간의 컨텍스트를 고려하여 새로운 사용자 경험 디자인을 제안하는 것을 목적으로 한다. 우선 IoT의 개념과 본질에 대한 고찰을 통해 미래 업무환경에 영향을 줄 수 있는 다양한 요소들을 정의하고 각 요소들의 관계를 파악하였다. 다음으로 현재 업무환경에서의 사용자리서치를 통해 다양한 형태의 업무환경에서 사용자의 행태에 영향을 미치는 컨텍스트를 파악하고, 이를 통해 미래 업무환경에서의 새로운 사용자 경험의 가능성을 보여줄 수 있는 인사이트(insight)를 도출하였다. 그리고 위의 분석과 인사이트를 바탕으로 새로운 미래의 업무환경에 대한 다양한 컨텍스트모델을 구성하고, 그에 따른 UX모델링을 통해 구체적인 UX시나리오와 대안을 제시하였다. 본 연구는 UX디자인의 관점을 디바이스 중심에서 공간과 컨텍스트 중심으로 확장시킴으로써, UX디자인 연구의 다양성에 기여할 것이며 공간디자인 분야와 서비스디자인 분야와의 협력적 연구 및 IoT서비스 관련분야와의 학제적 연구에 기여할 것이다.

ERP 도입 전 구성원의 저항 (A Study on Users' Resistance toward ERP in the Pre-adoption Context)

  • 박재성;조용수;고준
    • Asia pacific journal of information systems
    • /
    • 제19권4호
    • /
    • pp.77-100
    • /
    • 2009
  • Information Systems (IS) is an essential tool for any organizations. The last decade has seen an increasing body of knowledge on IS usage. Yet, IS often fails because of its misuse or non-use. In general, decisions regarding the selection of a system, which involve the evaluation of many IS vendors and an enormous initial investment, are made not through the consensus of employees but through the top-down decision making by top managers. In situations where the selected system does not satisfy the needs of the employees, the forced use of the selected IS will only result in their resistance to it. Many organizations have been either integrating dispersed legacy systems such as archipelago or adopting a new ERP (Enterprise Resource Planning) system to enhance employee efficiency. This study examines user resistance prior to the adoption of the selected IS or ERP system. As such, this study identifies the importance of managing organizational resistance that may appear in the pre-adoption context of an integrated IS or ERP system, explores key factors influencing user resistance, and investigates how prior experience with other integrated IS or ERP systems may change the relationship between the affecting factors and user resistance. This study focuses on organizational members' resistance and the affecting factors in the pre-adoption context of an integrated IS or ERP system rather than in the context of an ERP adoption itself or ERP post-adoption. Based on prior literature, this study proposes a research model that considers six key variables, including perceived benefit, system complexity, fitness with existing tasks, attitude toward change, the psychological reactance trait, and perceived IT competence. They are considered as independent variables affecting user resistance toward an integrated IS or ERP system. This study also introduces the concept of prior experience (i.e., whether a user has prior experience with an integrated IS or ERP system) as a moderating variable to examine the impact of perceived benefit and attitude toward change in user resistance. As such, we propose eight hypotheses with respect to the model. For the empirical validation of the hypotheses, we developed relevant instruments for each research variable based on prior literature and surveyed 95 professional researchers and the administrative staff of the Korea Photonics Technology Institute (KOPTI). We examined the organizational characteristics of KOPTI, the reasons behind their adoption of an ERP system, process changes caused by the introduction of the system, and employees' resistance/attitude toward the system at the time of the introduction. The results of the multiple regression analysis suggest that, among the six variables, perceived benefit, complexity, attitude toward change, and the psychological reactance trait significantly influence user resistance. These results further suggest that top management should manage the psychological states of their employees in order to minimize their resistance to the forced IS, even in the new system pre-adoption context. In addition, the moderating variable-prior experience was found to change the strength of the relationship between attitude toward change and system resistance. That is, the effect of attitude toward change in user resistance was significantly stronger in those with prior experience than those with no prior experience. This result implies that those with prior experience should be identified and provided with some type of attitude training or change management programs to minimize their resistance to the adoption of a system. This study contributes to the IS field by providing practical implications for IS practitioners. This study identifies system resistance stimuli of users, focusing on the pre-adoption context in a forced ERP system environment. We have empirically validated the proposed research model by examining several significant factors affecting user resistance against the adoption of an ERP system. In particular, we find a clear and significant role of the moderating variable, prior ERP usage experience, in the relationship between the affecting factors and user resistance. The results of the study suggest the importance of appropriately managing the factors that affect user resistance in organizations that plan to introduce a new ERP system or integrate legacy systems. Moreover, this study offers to practitioners several specific strategies (in particular, the categorization of users by their prior usage experience) for alleviating the resistant behaviors of users in the process of the ERP adoption before a system becomes available to them. Despite the valuable contributions of this study, there are also some limitations which will be discussed in this paper to make the study more complete and consistent.

Extended Role-Based Access Control with Context-Based Role Filtering

  • Liu, Gang;Zhang, Runnan;Wan, Bo;Ji, Shaomin;Tian, Yumin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권3호
    • /
    • pp.1263-1279
    • /
    • 2020
  • Activating appropriate roles for a session in the role-based access control (RBAC) model has become challenging because of the so-called role explosion. In this paper, factors and issues related to user-driven role management are analysed, and a session role activation (SRA) problem based on reasonable assumptions is proposed to describe the problem of such role management. To solve the SRA problem, we propose an extended RBAC model with context-based role filtering. When a session is created, context conditions are used to filter roles that do not need to be activated for the session. This significantly reduces the candidate roles that need to be reviewed by the user, and aids the user in rapidly activating the appropriate roles. Simulations are carried out, and the results show that the extended RBAC model is effective in filtering the roles that are unnecessary for a session by using predefined context conditions. The extended RBAC model is also implemented in the Apache Shiro framework, and the modifications to Shiro are described in detail.