• Title/Summary/Keyword: 사용자 편리성

Search Result 1,197, Processing Time 0.03 seconds

A study on the toilet lifting seat for the elderly (노약자를 위한 변기 리프팅 시트 연구)

  • Minseo Kim;Hyemin Son;Jinho Cho;Sang-Hyun Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.459-464
    • /
    • 2024
  • The purpose of this study is to design a toilet lifting seat to prevent falls accidents in the elderly while using the toilet. Prior to design, laws and national standards related to restroom use were investigated and the available space for the assistive devices to be installed was determined. In additions, considering the body size and operating range of the elderly, the optimal final position of the toilet seat is set so that users can use it more safely and conveniently without external help. Moreover, in order to provide an effective standing assistance function, a complex 4-bar link structure was applied to enable simultaneous seat elevation and angle adjustment when operating the device, and the appropriate link shape and dimensions were determined using a linkage program and UG NX. FEA analysis using ANSYS Workbench is performed to ensure the robustness of the stretched linkage and the feasibility of the lifting seat is verified through fabrication.

Research on a Model that reflects requests to suspend processing personal data in real time (개인정보 처리정지 요청을 실시간 반영하는 모델 연구)

  • Younhee Hong;Sang-Soo Ye
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.141-150
    • /
    • 2024
  • The importance of personal data protection is increasingly emphasized both at home and abroad, and while overseas countries are applying various policies and dynamic management technologies, there are some gaps between compliance with laws and regulations and the application of technologies in Korea, and there are few user interfaces that provide convenient ways for data subjects to stop processing personal data. This study first analyzes the need for dynamic personal information consent management technology, the current state of the industry, and the prospects for its development. Next, this study proposes a basic model for dynamic management of personal information consent that maximizes the data subject's right to personal data self-determination while strictly complying with personal data protection laws in Republic of Korea. In particular, this study analyzes the basis of domestic laws and regulations related to the suspension of personal data processing, designs a basic model of personal data consent dynamic management interface, and presents its effectiveness. Based on the results of this study, we expect that the proposed dynamic management model for personal data use consent can be used in various ways for various websites and applications in the future.

  • PDF

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

The Restaurant Accessibility and Task Evaluation Tool: Development and Preliminary Validation (식당의 접근성과 활동 평가 도구: 개발과 예비 타당성)

  • Park, Minsoo;Park, Kang-Hyun;Park, Ji-Hyuk;Smith, Roger O.
    • Therapeutic Science for Rehabilitation
    • /
    • v.9 no.3
    • /
    • pp.35-51
    • /
    • 2020
  • Objective : The purpose of this study was to develop and establish the preliminary validity of the Restaurant Accessibility and Task Evaluation Information Tool (RATE-IT), an electronic survey for evaluating restaurant accessibility for people with disabilities. Methods : A multi-phase method was used to develop and validate the RATE-IT. The taxonomy was developed in phase one, while the validity of the content was tested in phase two. Finally, the validity of the constructs was assessed in phase three. Results : The results indicated that appropriate items were included (relevance=0.99 and language level=0.99) and also supported that the RATE-IT evaluated the construct of restaurant accessibility (F=0.72, p=.40). When compared to a checklist of the Americans with Disabilities Act Accessibility Guidelines (ADAAG) for Buildings and Facilities questions, RATE-IT showed the potential to differentiate restaurants by their level of accessibility (p=.10). Further, the RATE-IT was also easy to use (p<.00), understandable (p<.00), and efficient (p<.00). Conclusion : RATE-IT shows a promising methodology and is strongly preferred by users.

An Educational Platform for Digital Media Prototype Development: an analysis and a usability study (디지털 미디어 콘텐츠 개발을 위한 교육용 플랫폼의 활용성)

  • Kim, Na-Young
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.77-87
    • /
    • 2011
  • The advent of new platforms each year along with the advancement of technology provides a new opportunity for digital media designers to develop creative and innovative contents. This phenomenon affect the same way the students that major in the digital media, and the use of the platforms that is based on the new technology in the development of contents gives a newer and useful opportunity for learning to the students who recently study the digital media area. As the main technology of the recent digital media that attract many students' attention, we are presenting virtual reality display, movement cognition, physical engine and the gesture interface, and developed the consolidated platform based on these four technologies, and designed them in a way that can be more easily implemented in a simpler way. In order to study the efficiency of the platform with the objective of the development of digital media contents, we have developed four different prototype contents, and have measured based on the user's preference, efficiency and satisfaction. In the results of usability evaluation, functionality, effectiveness, efficiency, satisfaction were rated as 'high'. This results shows that the suggested 3D platform environment provides students to develop a rapid prototype fast and easy, and this may have a positive influence on students major in the digital media to conduct creative development research.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

Personalized Media Control Method using Probabilistic Fuzzy Rule-based Learning (확률적 퍼지 룰 기반 학습에 의한 개인화된 미디어 제어 방법)

  • Lee, Hyong-Euk;Kim, Yong-Hwi;Lee, Tae-Youb;Park, Kwang-Hyun;Kim, Yong-Soo;Cho, Joon-Myun;Bien, Z. Zenn
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.2
    • /
    • pp.244-251
    • /
    • 2007
  • Intention reading technique is essential to provide personalized services toward more convenient and human-friendly services in complex ubiquitous environment such as a smart home. If a system has knowledge about an user's intention of his/her behavioral pattern, the system can provide mote qualified and satisfactory services automatically in advance to the user's explicit command. In this sense, learning capability is considered as a key function for the intention reading technique in view of knowledge discovery. In this paper, ore introduce a personalized media control method for a possible application iii a smart home. Note that data pattern such as human behavior contains lots of inconsistent data due to limitation of feature extraction and insufficiently available features, where separable data groups are intermingled with inseparable data groups. To deal with such a data pattern, we introduce an effective engineering approach with the combination of fuzzy logic and probabilistic reasoning. The proposed learning system, which is based on IFCS (Iterative Fuzzy Clustering with Supervision) algorithm, extract probabilistic fuzzy rules effectively from the given numerical training data pattern. Furthermore, an extended architectural design methodology of the learning system incorporating with the IFCS algorithm are introduced. Finally, experimental results of the media contents recommendation system are given to show the effectiveness of the proposed system.

Implementing an Integrated System for R&D Results Management (연구성과물 통합 관리 시스템 구현)

  • Shin, Sung-Ho;Um, Jung-Ho;Seo, Dong-Min;Lee, Seung-Woo;Choi, Sung-Pil;Jung, Han-Min
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.8
    • /
    • pp.411-419
    • /
    • 2012
  • In case that R&D results from R&D projects are well managed and archived, the research institutes can transfer the valuable technologies related to R&D results with some costs to corporations. However, it is still difficult to maintain and reuse R&D results because they are managed by each person or each department and not integrated between R&D results. Therefore, the government should undertake to manage R&D results overall by collecting meta data and distribute analyzed information from meta data. Each researching institute also makes an efforts to manage R&D results focusing on their reusing. For this purpose, in this paper, we present a process to manage R&D results; insert meta data of R&D results to the system, upload files of R&D results to the database of the system, inquire, and use meta data of R&D results. Based on the process, we design a system architecture for managing R&D results. In addition, it should be mainly considered to design a global schema for integrating R&D results into one database. The system shows detailed information on R&D results and provides R&D results conveniently to users. We expect that we may reduce the cost of reusing R&D results and improve the quality of R&D results with designing efficiently a process and a global schema of R&D result management system.

Development of Soil Erosion Analysis Systems Based on Cloud and HyGIS (클라우드 및 HyGIS기반 토양유실분석 시스템 개발)

  • Kim, Joo-Hun;Kim, Kyung-Tak;Lee, Jin-Won
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.4
    • /
    • pp.63-76
    • /
    • 2011
  • This study purposes to develop a model to analyze soil loss in estimating prior disaster influence. The model of analyzing soil loss develops the soil loss analysis system on the basis of Internet by introducing cloud computing system, and also develops a standalone type in connection with HyGIS. The soil loss analysis system is developed to draw a distribution chart without requiring a S/W license as well as without preparing basic data such as DEM, soil map and land cover map. Besides, it can help users to draw a soil loss distribution chart by applying various factors like direct rain factors. The tools of Soil Loss Anaysis Model in connection with HyGiS are developed as add-on type of GMMap2009 in GEOMania, and also are developed to draw Soil Loss Hazard Map suggested by OECD. As a result of using both models, they are developed very conveniently to analyze soil loss. Hereafter, these models will be able to be improved continuously through researches to analyze sediment a watershed outlet and to calculate R value using data of many rain stations.