• Title/Summary/Keyword: 사용자 유형

Search Result 1,148, Processing Time 0.02 seconds

A Study on the Classification of Role-playing as a Design Method and Its Utilization (디자인 방법으로서의 롤플레잉의 분류와 그 활용 기법에 관한 연구)

  • Hwang, Ga Young;Yeoun, Myeong Heum
    • Design Convergence Study
    • /
    • v.16 no.3
    • /
    • pp.51-68
    • /
    • 2017
  • User-centered design and Experience Design are emerging in the design area. Therefore, the Role-Playing Method has been actively utilized in the process of design development. But the terms of Role-Playing Method which follow these trends. has not been integrated. Further, it is hard to utilize the process of design development because the process method is not settled yet. Therefore, this study is into two parts of the research: Defining the concept of Role-Playing and the experiment of Role-Playing. Firstly, defining concept part is to research the design method corresponds to a wide range of Role-Playing that has a similar definition. After then, analyzed the examples of Role-Playing Methods which was derived matrix from Role-Playing classification. With this process, two axes of the matrix have been produced such as role·scenario and puppet. Through the analysis of the utility and vulnerability of the Role-Playing classification matrix, this study was able to propose the using step of the Role-Playing in the double diamond model. Secondly, two experiments were conducted in the experiment part. Through the pilot experiment explored the possibility of a study of the Role-Playing Method. In the second experiment, the process was conducted with Role-Playing classification matrix. As a result, each Role-Playing has different insights. In terms of design, different aspects of composing elements were found. Plus, in the position of the user, Role-Playing are can observe different parts of user's cognition between acting and puppet. Thus, the role-playing was proven to be useful to find out the point of improvement and insight in service from different perspectives and it resulted in the role playing which can be utilized selectively according to the type of service.

Performance Evaluation and Analysis on Single and Multi-Network Virtualization Systems with Virtio and SR-IOV (가상화 시스템에서 Virtio와 SR-IOV 적용에 대한 단일 및 다중 네트워크 성능 평가 및 분석)

  • Jaehak Lee;Jongbeom Lim;Heonchang Yu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.48-59
    • /
    • 2024
  • As functions that support virtualization on their own in hardware are developed, user applications having various workloads are operating efficiently in the virtualization system. SR-IOV is a virtualization support function that takes direct access to PCI devices, thus giving a high I/O performance by minimizing the need for hypervisor or operating system interventions. With SR-IOV, network I/O acceleration can be realized in virtualization systems that have relatively long I/O paths compared to bare-metal systems and frequent context switches between the user area and kernel area. To take performance advantages of SR-IOV, network resource management policies that can derive optimal network performance when SR-IOV is applied to an instance such as a virtual machine(VM) or container are being actively studied.This paper evaluates and analyzes the network performance of SR-IOV implementing I/O acceleration is compared with Virtio in terms of 1) network delay, 2) network throughput, 3) network fairness, 4) performance interference, and 5) multi-network. The contributions of this paper are as follows. First, the network I/O process of Virtio and SR-IOV was clearly explained in the virtualization system, and second, the evaluation results of the network performance of Virtio and SR-IOV were analyzed based on various performance metrics. Third, the system overhead and the possibility of optimization for the SR-IOV network in a virtualization system with high VM density were experimentally confirmed. The experimental results and analysis of the paper are expected to be referenced in the network resource management policy for virtualization systems that operate network-intensive services such as smart factories, connected cars, deep learning inference models, and crowdsourcing.

A Study on the Influential Factor of the Formation of Psychological Ownership on Personal Information (개인정보 소유감을 형성하는 영향 요인에 관한 연구)

  • Minjung Park;Sangmi Chai
    • Information Systems Review
    • /
    • v.20 no.3
    • /
    • pp.33-49
    • /
    • 2018
  • Since there are growing concerns regarding personal information, users have perceived the importance of it. It makes users try to manage and control personal information by their own intentions. Therefore, we assume users now have begun to perceive psychological ownership on personal information. A main objective of this study is to identitythe relationship between accountability, self-identity, self-efficacy and sense of belongingness and psychological ownership on personal information. We conduct an online-basedsurvey and establish a structural equation model for testing hypothesis. The results show that users' accountability, self-identity and sense of belongingness positively influence to psychological ownership on personal information. Additionally, users' perceived psychological ownership on personal information increase their concern for information privacy. This study suggests a new concept as 'perceived psychological ownership on personal information' to explain for intentions of their psychological possessions toward personal information. The findings of this study can provide a way for how firms have to require clients' personal information with increasing their satisfactions.

Design and Implementation of Internet Telephony Services (인터넷 텔레포니(VoIP) 서비스의 설계 및 구현)

  • 이종화;강신각
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.9C
    • /
    • pp.842-852
    • /
    • 2002
  • The fast advance in the VoIP technologies gives a rich opportunity to create different kind of VoIP applications such as IP telephony services. The application level call signaling protocols such as ITU-T H.323 and IETF SIP provide the communication functions of end-to-end call setup and release. Currently, there is a lot of H.323 based VoIP products in the market, however SIP is considered as a suitable protocol for supporting applications in IP environments, so SIP based VoIP products and services begin to appear. In this paper, firstly we present the characteristics of some possible SIP based applications and describe the design and implementation of a VoIP example service named PC-to-PC Internet telephony service using the developed SIP network components. The PC-to-PC Internet telephony service and User Agent are developed in MS window 98/2000 using visual C/C++, and Proxy server and Registrar in Linux 7.0 using C, respectively.

Development and Implementation of Functions for Mobile Robot Navigation (이동 로봇의 자율 주행용 함수 개발 및 구현)

  • Jeong, Seok-Ki;Ko, Nak-Yong;Kim, Tae-Gyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.3
    • /
    • pp.421-432
    • /
    • 2013
  • This paper describes implementation of functions for mobile robot localization, which is one of the vital technologies for autonomous navigation of a mobile robot. There are several function libraries for mobile robot navigation. Some of them have limited applicability for practical use since they can be used only for simulation. Our research focuses on development of functions which can be used for localization of indoor robots. The functions implement deadreckoning and motion model of mobile robots, measurement model of range sensors, and frequently used calculations on angular directions. The functions encompass various types of robots and sensors. Also, various types of uncertainties in robot motion and sensor measurements are implemented so that the user can select proper ones for their use. The functions are tested and verified through simulation and experiments.

An Analysis on SNS Management and Visitors' response of Nuclear Regulatory Organizations : Focus on the Comparison about facebook page between NSSC and NRC (원자력 규제기관의 SNS 활용 및 수용자 반응 분석 : 원자력안전위원회와 NRC 페이스북 비교를 중심으로)

  • Choi, Hyun-Joo;Shim, Eun-Jung
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.11-19
    • /
    • 2016
  • SNS users are continuously increasing and SNS is emerging as a major PR channel of government. In particular, SNS can be a useful tool, but also the challenges for risk communication. This study is examined how nuclear regulatory organizations' SNS management and visitors' responses to the facebook pages in Korea and U.S.. Results indicated that both organizations frequently used information-oriented posting. Concerning the types of PR, NSSC tended to mainly use 'Relationship-Management PR', NRC mainly use 'Image PR.' In addition, our analyses on visitors' responses showed that visitors usually in response to participational and visual(ex. video, card news) typed contents. Based on its' results, this study provides practical suggestions for government's future SNS management strategies.

Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD (효율적인 BYOD 접근통제를 위한 802.1X 네트워크 접근통제 구현과 성능 해석)

  • Lee, Min Choul;Kim, Jeongho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.271-282
    • /
    • 2015
  • In the business environment BYOD(Bring Your Own Device) is used and being expanded continuously. According to a survey conducted by Cisco in 2012 on 600 companies, 95% of them are already permitting the use of BYOD in their work environments so that productivity of their employees has improved as a result. Gartner predicted that the use of BYOD will be caused new security threat. They also suggested to introduce NAC(Network Access Control) to resolve this threat, to separate network zone based on importance of their business, to establish the policy to consider user authority and device type, and to enforce the policy. The purpose of this paper is to design and implement the NAC for granular access control based on IEEE(Institute of Electrical and Electronics Engineers) 802.1X and DHCP(Dynamic Host Configuration Protocol) fingerprinting, and to analyze the performance on BYOD environment.

3D Avatar Gesture Representation for Collaborative Virtual Environment Design (CVE 디자인을 위한 3D 아바타의 동작 표현 연구)

  • Lee Kyung-Won;Jang Sun-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.4
    • /
    • pp.122-132
    • /
    • 2005
  • CVE(Collaborative Virtual Environment) is the virtually shared area where people cannot come together physically, but wish to discuss, collaborate on, or even dispute certain matters. In CVEs, in habitants are usually represented by humanoid embodiments, generally referred to as avatars. But most current graphical CVE systems fail to reflect the natural relationship between the avatar's gesture and the conversation that is taking place. More than 65% of the information exchanged during a person to person conversation is carried on the nonverbal band. Therefore, it is expected to be beneficial to provide such communication channels in CVEs in some way. To address this issue, this study proposes a scheme to represent avatar's gestures that can support the CVE users' communication. In the first level, this study classifies the non-verbal communication forms that can be applicable to avatar gesture design. In the second level, this study categorizes the body language according to the types of interaction with verbal language. And in the third level, this study examines gestures with relevant verbal expressions according to the body parts-from head to feet. One bodily gesture can be analyzed in the description of gesture representation, the meaning of gesture and the possible expressions, which can be used in gestural situation.

  • PDF

The Effect of the Whole Experience of Online Brand on the Consumer-Brand Relationship, Brand Attachment and Brand Commitment : With the Users of Naver Brand Cafe (온라인 브랜드의 총체적 체험이 소비자-브랜드 관계 및 브랜드 애착, 브랜드 몰입에 미치는 영향 - 네이버 브랜드 카페 사용자들을 중심으로 -)

  • Han, Kwang-Seok
    • Management & Information Systems Review
    • /
    • v.30 no.1
    • /
    • pp.159-185
    • /
    • 2011
  • We can divide brand experience in the brand community of online blog into the following five types: sensuous experience, emotional experience, cognitive experience, behavioral experience, and relational experience. And this study is aimed at looking into what differences are among the effects those five have on the consumer-brand relationship. Also we wanted to analyse empirically what structural relations this consumer-brand relationship through the whole experience has with brand attachment and brand commitment. The outcome shows that emotional experience, cognitive experience and relational experience affect the consumer-brand relationship but sensuous experience and behavioral experience. And our analysis of what structural relations the consumer-brand relationship through brand experience has with brand attachment and brand commitment revealed that the consumer-brand relationship through brand experience has a direct effect on brand attachment but it doesn't have on brand commitment. Brand commitment was confirmed to be affected only through brand attachment. Finally, this is in agreement with the result of the precedent study that brand commitment is an effect variable of brand attachment.

  • PDF

A Study on Security Management Methods for Information System of Educational Institutions (교육기관의 정보시스템 보안관리 방안 연구)

  • Choi, JinMyung;Kim, DooYeon
    • The Journal of Korean Association of Computer Education
    • /
    • v.20 no.6
    • /
    • pp.95-104
    • /
    • 2017
  • The damage caused by information spill, forgery, falsification, and deletion by cyber infringement in educational institutions and universities is very large. In this study, we analyzed the types, causes, and problems of cyber infringement in educational administrative institutions and universities. As a result, administrative, physical and technical information protection activities were weak. In this paper, we propose a security enhancement method for each domain by dividing them into Internet zone, network-neutral zone (DMZ: Demilitarized Zone), general server zone, internal server zone (Server Farm), and user zone so that these vulnerabilities can be easily identified, supplemented or security enhanced. In addition, we have proposed a method to apply security information system architecture and information protection technology correctly for educational administration institutions and universities. This study is meaningful not to provide conceptual guidance but to suggest specific action and procedure oriented security management plan.