• Title/Summary/Keyword: Personal-usage

Search Result 459, Processing Time 0.03 seconds

A Study of the Effects of Perceived Characteristics on Satisfaction and Continuous Usage Intention in Personal Communities (개인 커뮤니티의 지각된 특성이 만족 및 지속적 사용의도에 미치는 영향에 관한 연구)

  • Chung, Young-Soo;Jung, Chul-Ho
    • The Journal of Information Systems
    • /
    • v.16 no.3
    • /
    • pp.133-159
    • /
    • 2007
  • The primary purpose of this study is to examine the effects of perceived characteristics on user satisfaction and continuous usage intention in personal communities. We developed a research model based on the literature reviews of personal communities, TAM, perceived risks, and satisfaction. The research model includes perceived playfulness, perceived ease of use, perceived usefulness, and perceived risk as perceived characteristics in personal communities. For validation of this theoretical model, we survey the users of 'Mini-hompy', one of the most popular personal communities in Korea. The research model was empirically verified by structural equation model analysis with data collected from 407 samples. Analysis of the results indicates that perceived ease of use is positively related perceived playfulness and perceived usefulness. Perceived playfulness, perceived ease of use, and perceived risks are significantly related to satisfaction. User's satisfaction has positive relationship with continuous usage intention in personal communities.

  • PDF

A Study on Notification Method of Personal Information Usage History using MyData Model (마이데이터 모델을 활용한 개인정보 이용내역 통지 방안 연구)

  • Kim, Taekyung;Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.1
    • /
    • pp.37-45
    • /
    • 2022
  • With the development of the 4th industry, big data using AI is being used in many areas of our lives, and the importance of data is increasing accordingly. In particular, as various services using personal information appear and hacking attacks that exploit them appear in various ways, the importance of personal information management is increasing. Personal information must be managed safely even when collecting, retaining, using, providing, and destroying personal information, and the rights of information subjects must be protected. In this paper, an analysis was performed on the notification of usage history during the protection of the rights of information subjects using the MyData model. According to the Personal Information Protection Act, users must be periodically notified of the use of personal information, so we notify each individual of the use of personal information through e-mail or SNS once a year. It is difficult to understand and manage which company use my personal information. Therefore, in this paper, a personal information usage history notification system model was proposed, and as a result of performance analysis, it is possible to provide the controllability, availability, integrity, source authentication, and personal information self-determination rights.

Personal-usage Authentication of Broadcast Programs Using a Secure Portable Storage (휴대용 보안 저장매체 기반 방송프로그램 사적이용 인증 기법)

  • Lee, Joo-Young;Choo, Hyon-Gon;Nam, Je-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.10-18
    • /
    • 2009
  • In this paper, we propose a novel method for authenticating a user's personal-usage using a secure portable storage, so that the user carrying the secure portable storage is able to consume his/her own broadcast programs freely, regardless of the location of the devices. The proposed authentication process is performed by a portable personal-usage authentication device, an access-control module for the portable personal-usage authentication device, and a player integrating the access control module. The portable personal-usage authentication device plays a role of secure storage in which domain authentication information is securely stored, while the access-control module is in charge of accessing the authentication information and, consequently, acquiring a decryption key. The player decrypts the broadcast programs in real time and processes the decrypted media streams. In this Paper, we describe the structure and procedure of the proposed model, and verify its feasibility by implementation.

Residential Factors and Use Conditions in the Living Spaces of South Korea and Japan (한.일 주거 공간에서의 거주요소와 그 이용 상황)

  • Park, Ji-Yeon
    • Journal of the Korean housing association
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2011
  • The purpose of this research lies in providing basic data for appropriate territorial adjustment within the family by understanding the relation to family members and how 'territorial dislocations' caused by differences in personal space and behavioral domains are used and controlled as living elements. As a result, the following data could be obtained. 1. General usage conditions of living elements. When the order of usage conditions of living elements is reviewed, the living elements interspersed at the personal space and behavioral territory in public and private spaces show a high usage rate, and in the case where living elements are shared with other families, many living elements are controlled by each family. Also, for living elements with a high possibility of sharing, a high consciousness for public usage is shown rather than elements controlling the territory, and the usage rate as territory controlling living elements is not high. 2. Compared to Japan, in Korea elements that can be placed at a certain location are often used as elements that resolve 'territorial dislocation', using furniture rather than objects. On the other hand, in Japan 'territorial dislocation' is often resolved by establishing a personal territory within the living space. Lastly, compared to Japan, in Korea 'territorial dislocation' is often resolved by maintaining a personal territory spatially rather than territorially.

Study on the Personal Air-Conditioning System Considering Human Thermal Adaptation (인간의 열적 적응성을 고려한 퍼스널 공조시스템의 개발)

  • 송두삼
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.15 no.6
    • /
    • pp.524-532
    • /
    • 2003
  • In this paper, a personal air-conditioning system considering the human thermal adaptability is analyzed. Although the conventional personal air-conditioner was proofed to be satisfactory in providing for the thermal comfort, it is being questioned on the term of its energy efficiency. Therefore, it is important and urgent to develop new types of personal air-conditioning system with sustainable control strategy that can ensure energy saving and thermal comfort simultaneously. In this study, we first examined the problems of the conventional personal air-conditioning system with field interview and laboratory experiment in terms of usage, management and thermal comfort, and proposed the energy-saving personal air-conditioning system considering the human thermal adaptation. Then a laboratory experiment was performed to analyze the characteristics of the human thermal comfort under severe indoor thermal conditions, which were controlled using a new personal air-conditioning unit designed according to the proposal. The results help to illustrate the alleviation effect of the new personal air-conditioning system, and indicate that the thermal alleviation time is useful to maintain the thermal comfort with efficient usage of energy.

The Perception of Problem of Internet Usage and Willingness of Internet Education among Adolescents on Jeju Island (청소년의 인터넷 이용에 따른 문제점 인식과 인터넷교육 의사에 관한 연구 -제주지역을 중심으로-)

  • Jin, Yeon-Ju;Kim, Hye-Yeon
    • Journal of the Korean Home Economics Association
    • /
    • v.44 no.12
    • /
    • pp.79-91
    • /
    • 2006
  • The purpose of this study was to investigate the perception of problem of internet usage and the willingness to receive internet education among adolescents on Jeju Island, who are core internet users, and the related variables. The survey was administered to 566 students from elementary and middle schools on Jeju. The data were analyzed by T-test, ANOVA analysis, DMR test and logistic regression analysis. The major results of this study were as follows. First, the adolescents perceived the conflict with family due to the problem of internet usage. Taken as a whole, the perception of a problem due to internet usage was low. Second, the internet-related variables were very important to the perception level of the problem in that there was a significant difference in all sub-spheres according to the internet usage time. Also, the personal-related variables such as gender, age, and personal expenses had a meaningful difference on the perception level of problem. Third, adolescents' willingness to receive internet education was considerably high. The personal-related variables such as gender and school record had a meaningful influence on the willingness of the internet education.

Exploring Self-Presentation Behaviors in SNS : Focusing on Personal Characteristics and Social Influences (소셜네트워크 서비스(SNS)에서의 자아노출 행위탐색 : 개인적 속성과 사회적 영향효과를 중심으로)

  • Moon, Yun Ji;Um, Hyemi
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.2
    • /
    • pp.1-21
    • /
    • 2018
  • This study aims to investigate the usage patterns of users in Social Network Services (SNS) where is an upsurge. Specifically, the paper considers the reason why young people more and more prefer online (or mobile) SNS activities rather than offline face-to-face social relationship. Furthermore, the drivers which affect SNS usages are considered from users' personal characteristics and social influences. User's personal characteristics include their personalities (extraversion and introversion), narcissism, and life satisfaction. Social influences involve subjective norm, visibility, and image. Affected by personal and social factors in SNS, users intend to show positive self-presentation, which refers to a behavior to selectively expose his/her goodness to others. As one of the most influential drivers affecting SNS usage, the positive self-representation has an effect on the level of SNS usage. Thus, this paper suggests the hypothesized research model focusing on positive self-representation in the relationship among personal characteristics, social influence, and user's behavior in SNS. Empirical data analysis with 100 questionnaires suggests that all hypotheses were adopted except for the effect of visibility among social influence factors on positive self-representation.

Factors Affecting the Usage of Elderly People's Smartphones: Based on UTAUT Model (고령자의 스마트폰 활용행동에 영향을 미치는 요인: 통합기술수용모델(UTAUT)을 중심으로)

  • Jang, Hyun-Yong;Koh, Joon
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.143-169
    • /
    • 2017
  • Purpose With the increase of the elderly population, the growth of its information system related market is increasing. However, empirical studies for the usage of elderly people's smartphones are still limited. This study aims to investigate the factors that affect the seniors' smartphone usage behaviors. Design/Methodology/Approach First, a preliminary study was conducted with targeting seniors who have visited Gwangju Senior Technology Center(GSTC) in order to understand the factors that affect the intention of utilizing smartphones. Next, based on the preliminary study results and literature reviews including the UTAUT model, performance expectancy, effort expectancy and social influence were considered for the major factors affecting the usage of elderly people's smartphones. Also, the moderate effects of personal innovativeness and usage function were discussed. A questionnaire survey of 181 seniors visiting GSTC was analyzed to empirically test the research model. Findings By the empirical tests, the performance expectancy and the effort expectancy of the seniors had significant impacts on their smartphone usage behavior. While the moderating effect of personal innovativeness was not significant, the moderating effect of the usage function was significant in the relationship between performance expectancy and the smartphone usage behavior. The results of this study are expected to provide guidelines to excavate the technical development and the niche market targeting the elderly people.

A Study on Factors Influencing the Performance of the Knowledge Management System(KMS): Focused on Subjective Norm and Personality (지식관리시스템의 성과에 영향을 미치는 요인에 관한 연구: 주관적 규범, 성격특성을 중심으로)

  • Kang, Mun-Sang;Kang, Sung-Bae;Shin, Mun-Bong
    • Knowledge Management Research
    • /
    • v.12 no.5
    • /
    • pp.71-87
    • /
    • 2011
  • This study focuses on influencing factors of TAM on personality, subjective norm and then examines the relationship between influencing factors such as KMS usage and system performance. The survey was collected from KMS users by e-mail and on-line questionnaire. Finally, 206 questionnaires were chosen for the analysis of data. It was analyzed by SPSS and AMOS for the frequency analysis, reliability analysis, CFA(Confirmatory Factor Analysis) and SEM(Structural Equation Modeling). The results were as follows. First, subjective norm is found to be especially important to KMS usage. Second, Extraversion positively moderated the relationship between subjective norm and perceived usefulness. Third, KMS usage is significant to personal performance such as knowledge growth, decision making and the ability of problem solving. This study proposed that the usage of Knowledge Management System positively contributes to the improvement of personal performance.

  • PDF

Safety Improvement Methods of Personal Identification Services using the i-Pin (아이핀 기반 본인확인서비스의 안전성 강화 방안)

  • Kim, Jongbae
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.97-110
    • /
    • 2017
  • Due to development of IT, various Internet services via the non-face-to-face are increasing rapidly. In the past, the resident registration numbers (RRN) was used a mean of personal identification, but the use of RRN is prohibited by the relevant laws, and the personal identification services using alternative means are activated. According to the prohibition policy of RRN, i-PIN service appeared as an alternative means to identify a person. However, the user's knowledge-based i-PIN service continues to cause fraudulent issuance, account hijacking, and fraud attempts due to hacking accidents. Due to these problems, the usage rate of i-PIN service which performs a nationwide free personal identification service, is rapidly decreasing. Therefore, this paper proposes a technical safety enhancement method for security enhancement in the i-PIN-based personal identification service. In order to strengthen the security of i-PIN, this paper analyzes the encryption key exposure, key exchange and i-PIN authentication model problems of i-PIN and suggests countermeasures. Through the proposed paper, the i-PIN can be expected to be used more effectively as a substitution of RRN by suggesting measures to enhance the safety of personal identification information. Secured personal identification services will enable safer online non-face-to-face transactions. By securing the technical, institutional, and administrative safety of the i-PIN service, the usage rate will gradually increase.