• Title/Summary/Keyword: 사용자 유형

Search Result 1,151, Processing Time 0.024 seconds

A Study of Universal Web USER INTERFACE Design for a Disabled (장애인을 위한 유니버설 웹 유저 인터페이스 디자인에 관한 연구)

  • Lee, Joong-Yeub
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.191-200
    • /
    • 2007
  • This study was identify web interface design factors for increasing information processing and attention for mentally disabled men. Gaining information via the internet is becoming pivotal in today"s society as the internet is becoming the center of knowledge and information. The goal of this study is to present the guideline of web interface design for the disabled men who are alienated in gaining information from the Internet. If the internet were more user friendly to the disabled men, they would be able to spend more time in doing what they enjoy and also in self development, with the information gained on the internet. This study investigated current portal sites to understand the present situation, surveyed and interviewed the disabled men, and researched literatures on how the disabled men perceive various stimulants and also researched documents for previous guidelines on interface design for them. This study investigated internet sites which the disabled men use to gather information about products and which entice their purchasing desires. The conclusion is that the usability can be improved by eliminating visual dizzy elements in the pages, simplifying the layout and the menu designs which represent the information architecture.

  • PDF

A Study on the Internet Advertisement. Waking banner and e-mail type advertising the prime object) (인터넷 광고에 관한 연구 -배너광고와 이메일 광고를 중심으로)

  • 손상희
    • Archives of design research
    • /
    • v.14 no.3
    • /
    • pp.107-116
    • /
    • 2001
  • Despite young age, Internet, as new advertising media, is actively studied worldwide. In 1995, the department of multimedia-related study was first founded in Technical Institute and has carried out the On Internet banner, user is not an object to accept only a message but has a specification to contact with banner actively having various motivation and desire. Internet advertising has various types but banner and e-mail type advertising are main stream. In the view point of recognition and concern rate, banner is very effective because it does not set limit to specific target, but is shown to unspecific audience. Acceding to studies, usage frequency and effect of e-mail type advertising is growing up. And e-mail type advertising is more active because it can target specific audience with various life style. If we can say banner is not so effective in spite of simply good exposure frequency, we can find theoritical background that e-mail type advertising is more effective internet advertising media because high click frequency. And we suppose that this study can be a guide line for measuring process of Internet advertising effect.

  • PDF

A Study on the Approach Method of Product Form by User Mental -Concentrated on Implicit & Explicit memory- (사용자 심리적 연상에 의한 제품형태 접근 방법에 관한연구 -암묵기억과 외현기억을 중심으로-)

  • 안철홍;정도성
    • Archives of design research
    • /
    • v.15 no.1
    • /
    • pp.27-36
    • /
    • 2002
  • To do this, study of human memory and theoretical approach on form in general is carried out to compare the types of memories and the stage of perceive theoretically to discover the relationship between psychological perceive and form. In the second please, scenario of form recognition in cultural aspect is studied through various written records to obtain unbiased critics on what a person can feel from a form through various analysis and experiment. Examples will be given on products designed on the basis of correlation with form through analysis. Through this procedure, elements of reactions on implicit and explicit is derived (Data obtained from experiments on computers and inquiries are used) Analyzed elements are than divided into, general knowledge, memories of reality and subconsciousness memories and basic mental image and user mental image and mental image of form of each products are analyzed. In the third phase, the way of adapting of the elements obtained from the analysis of implicit and explicit reaction to the field of design is predicted. Together with this, future theme this the study will be suggested. Confusions obtained from this study can be listed as below.

  • PDF

On-Line Korean Character Recognition by the Stroke Information of Korean Phoneme in Multimedia Terminal (한글 자소의 획 정보에 의한 멀티미디어 단말기에서의 온라인 한글 문자 인식)

  • Oh Juntaek;Jung Momoon;Lee Woobeom;Kim Wookhyun
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.1 no.1
    • /
    • pp.64-73
    • /
    • 2000
  • The Korean character recognition technology for user interface in multimedia terminal requires fast processing time and high recognition rate. In this paper, we propose an phoneme and character recognition technology which uses characteristic information of korean and features of input strokes, i.e, feature point, feature vector, virtual vector, position relation between strokes. And, a recognition both phoneme and character by the various writing types of users uses korean database. The Korean database has been constructed by the characteristic information of korean and phoneme models which have various stroke information. Also, we use successive processing by the position relation between strokes and backtracking processing by the modification processing of stroke numbers which composed of each phoneme. This method reduces the complex processing of phoneme separation. The proposed on-line korean character recognition system has obtained 13msec average character processing time and correct recognition rate more than $95{\%}$ In a recognition experiment, where we tested 600 characters written by 10 people among 1,200 words.

  • PDF

Design of Intrusion Responsible System For Enterprise Security Management (통합보안 관리를 위한 침입대응 시스템 설계)

  • Lee, Chang-Woo;Sohn, Woo-Yong;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.51-56
    • /
    • 2005
  • Service operating management to keep stable and effective environment according as user increase and network environment of the Internet become complex gradually and requirements of offered service and user become various is felt constraint gradually. To solve this problem, invasion confrontation system through proposed this log analysis can be consisted as search of log file that is XML's advantage storing log file by XML form is easy and fast, and can have advantage log files of system analyze unification and manages according to structure anger of data. Also, created log file by Internet Protocol Address sort by do log and by Port number sort do log, invasion type sort log file and comparative analysis created in other invasion feeler system because change sort to various form such as do log by do logarithm, feeler time possible.

  • PDF

Security Threats in the Mobile Cloud Service Environment (모바일 클라우드 서비스 환경에서의 보안위협에 관한 연구)

  • Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.263-269
    • /
    • 2014
  • Mobile Cloud Service will provide cloud services through mobile devices. Because storage space constraints and computing process performance limitations of mobile devices, this service will process in the cloud environment after moving works and data that have to process in mobile terminal. The obstacles of mobile cloud service activity will have concerned high about the reliability service, data security, and the confidentiality security. In particular, in convergence of mobile services and cloud services, each threats are expected to be generated complicatedly. In this paper, we define the type of mobile cloud services as well as security threats that can occur in mobile cloud. Also we suggest security countermeasures in mobile app. and enterprises countermeasures. We suggest verification of mobile applications for user information protection about security countermeasures in mobile app. Also we describe the cloud providers responsibility and user responsibility about enterprises countermeasures.

Design and Implementation of a Paper Submission Management System Using Domain Object Interface and Object Oriented Design Patterns (객체지향 설계 유형 및 도메인 객체 인터페이스를 이용한 논문 투고 관리 시스템 설계 및 구현)

  • Sim, Chun-Bo;Jung, Se-Hoon;Lim, Eun-Cheon;You, Kang-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.449-458
    • /
    • 2010
  • Recently, the interest on object oriented design patterns has been increased considering to reusability of software and efficiency of maintenance expense in designing software architecture. In this paper, we design the paper submission management system applicable to specific domain using domain object interface based on object oriented design patterns, and then implement it with Java and XML. The proposed system applies method of implementation by assemblying each system objects with upward after system entire architecture design by combining properly downward method and upward method and applies with GoF Design pattern. As well as, we convert domain data of system into the form of various persistent objects through XML, and minimize the complexity of system by not adopting method that generates domain object as in Class with automatic. Finally, the implementation of our system can be used in general C/S environment, but we implement system user GUI using the XSLT built in general web browser in consideration for user convenience and consistency.

Personal Information Protection for Biometric Verification based TeleHealth Services (바이오인식을 이용한 원격의료에서의 개인정보보호)

  • Shin, Yong-Nyuo;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.659-664
    • /
    • 2010
  • This paper provides an integrated framework for biometric data and private information protection in TeleHealth. Biometric technology is indispensable in providing identification and convenience in the TeleHealth environment. Once biometric information is exposed to mallicious attacker, he will suffer great loss from the illegferuse of his biometric data by someone else because of difficulty of change not like ID and password. We have to buil by someone esystem data bon the integrated framework for biometric data and private information protection in TeleHealth. First, we consider the structure of the biometric system and the security requirements of y someone esystem data bon the biometrics. And then, we define the TeleHealth system model and provide the vulnerabilities and countermeasures of the biometric-data by someone eintegrated model.byhe TeleHealth sse bec requires two-phata authentication for countermeasure. Finally, we made some functionferrequirements for main componenets of biometric-data bintegrated TeleHealth system framework to protect biometric data.

A Study on Improvement of Effectiveness Using Anomaly Analysis rule modification in Electronic Finance Trading (전자금융거래의 이상징후 탐지 규칙 개선을 통한 효과성 향상에 관한 연구)

  • Choi, Eui-soon;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.615-625
    • /
    • 2015
  • This paper proposes new methods and examples for improving fraud detection rules based on banking customer's transaction behaviors focused on anomaly detection method. This study investigates real example that FDS(Fraud Detection System) regards fraudulent transaction as legitimate transaction and figures out fraudulent types and transaction patterns. To understanding the cases that FDS regard legitimate transaction as fraudulent transaction, it investigates all transactions that requied additional authentications or outbound call. We infered additional facts to refine detection rules in progress of outbound calling and applied to existing detection rules to improve. The main results of this study is the following: (a) Type I error is decreased (b) Type II errors are also decreased. The major contribution of this paper is the improvement of effectiveness in detecting fraudulent transaction using transaction behaviors and providing a continuous method that elevate fraud detection rules.

Limiting user process method based on PAM against DoS attacks (DoS 공격에 대비한 PAM 기반 사용자 프로세스 제한 기법)

  • Lee, Jae-Ung;Jung, Sung-Jae;Bae, Yu-Mi;Jang, Rae-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.309-312
    • /
    • 2016
  • Considering that interkorean relations got worse and worse recently, cyber terror of North Korea has seriously become a possibility. Therefore, DoS(Denial of Service), a typical way of cyber terror, is becoming a big issue. Consequently, people are growing more and more interested in information security. Internal DoS attacks, out of a variety of ways of Dos attacks, include disks and memories and shortages of process resources. PAM(Pluggable Authentication Module) is one of the ways of preventing internal DoS attacks in Linux system. This paper provides with a method to internally respond to dos attacks and efficiently prevent shortages of resources by utilizing PAM.

  • PDF