• Title/Summary/Keyword: A potential user

Search Result 731, Processing Time 0.03 seconds

Detecting CSRF through Analysis of Web Site Structure and Web Usage Patterns (웹사이트 구조와 사용패턴 분석을 통한 CSRF 공격 탐지)

  • Choi, Jae-Yeong;Lee, Hyuk-Jun;Min, Byung-Jun
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.9-15
    • /
    • 2011
  • It is difficult to identify attack requests from normal ones when those attacks are based on CSRF which enables an attacker transmit fabricated requests of a trusted user to the website. For the protection against the CSRF, there have been a lot of research efforts including secret token, custom header, proxy, policy model, CAPTCHA, and user reauthentication. There remains, however, incapacitating means and CAPTCHA and user reauthentication incur user inconvenience. In this paper, we propose a method to detect CSRF attacks by analyzing the structure of websites and the usage patterns. Potential victim candidates are selected and website usage patterns according to the structure and usage logs are analyzed. CSRF attacks can be detected by identifying normal usage patterns. Also, the proposed method does not damage users' convenience not like CAPTCHA by requiring user intervention only in case of detecting abnormal requests.

Determinants of Intention to Use mobile E-book Based on the Technology Acceptance Model (기술수용모델에 기반 한 모바일 E-book 사용의도에 미치는 영향요인에 관한 연구)

  • Lee, Hyojung;Kim, Seonghee
    • Journal of Korean Library and Information Science Society
    • /
    • v.46 no.2
    • /
    • pp.131-151
    • /
    • 2015
  • The purpose of this study was to identify factors on the user's intention of using mobile E-book based on TAM(Technology Acceptance Model). System quality(accessibility and convenience), information quality, and innovation as a user characteristics were chosen as the independent variable of this study, perceived easy of use and perceived usefulness were selected as potential variable, and user's use intention was selected as dependent variable. The survey was conducted by 170 high school students and structural equation modeling was used to analyze the relationships between factors. The results showed that information quality and the user's innovation have a positive impact on both perceived usefulness and perceived ease of use while the other system factors did not affect perceived usefulness and perceived ease of use for mobile E-book. Finally, the perceived usefulness was found to have a positive impact on the user's intention to use mobile E-book.

User Types of Shared Mobility Services and UX Design Strategies: an application of Q Methodology (Q방법론을 적용한 공유 모빌리티 서비스의 이용자 유형 연구 및 모빌리티 서비스 UX 디자인 전략)

  • Hong, Seung-Hye;Byun, Young-Si;Lee, Jeong-Myeong
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.10
    • /
    • pp.568-580
    • /
    • 2019
  • With mobility-as-a-service(MaaS) drawing attention to its influence and ripple effect around the world, the mobility service market is currently growing rapidly mainly focusing on mobility sharing. In order to preemptively dominate the mobility service market following the full-scale spread of MaaS, it is important to first identify the recognition and experience of users in personal mobility sharing services, which are currently in the early stages of diffusion, and through which to understand the characteristics of potential consumers of the extended mobility service market. Therefore, the study aims to classify the user types of mobility service and establish a future user experience-oriented mobility service strategy using a subjectivity study method, Q methodology.

A Development of Cognitive Assessment Tool based on Brain-Computer Interface for Accident Prevention (안전사고 예방을 위한 Brain-Computer Interface 기반 인지평가 도구 개발)

  • Lee, Chung-Gi;Yu, Seon-Guk
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2011.11a
    • /
    • pp.583-591
    • /
    • 2011
  • A number of Brain-Computer Interface (BCI) studies have been performed to assess the cognitive status through EEG signal. However, there are a few studies trying to prevent user from unexpected safety-accident in BCI study. The EEGs were collected from 19 subjects who participated in two experiments (rest & event-related potential measurement). There was significant difference in EEG changes of both spontaneous and event-related potential. Beta power and P300 latency may be useful as a biomarker for prevention of response to safety-accident.

  • PDF

A Development of Cognitive Assessment Tool based on Brain-Computer Interface for Accident Prevention (안전사고 예방을 위한 Brain-Computer Interface 기반 인지평가 도구 개발)

  • Lee, Chung-Ki;Yoo, Sun-Kook
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.1
    • /
    • pp.1-6
    • /
    • 2012
  • A number of Brain-Computer Interface (BCI) studies have been performed to assess the cognitive status through EEG signal. However, there are a few studies trying to prevent user from unexpected safety-accident in BCI study. The EEGs were collected from 19 subjects who participated in two experiments (rest & event-related potential measurement). There was significant difference in EEG changes of both spontaneous and event-related potential. Beta power and P300 latency may be useful as a biomarker for prevention of response to safety-accident.

Crowdsourced Risk Minimization for Inter-Application Access in Android

  • Lee, Youn Kyu;Kim, Tai Suk
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.5
    • /
    • pp.827-834
    • /
    • 2017
  • Android's inter-application access enriches its application ecosystem. However, it exposes security vulnerabilities where end-user data can be exploited by attackers. While existing techniques have focused on minimizing the risks of inter-application access, they either suffer from inaccurate risk detection or are primarily available to expert users. This paper introduces a novel technique that automatically analyzes potential risks between a set of applications, aids end-users to effectively assess the identified risks by crowdsourcing assessments, and generates an access control policy which prevents unsafe inter-application access at runtime. Our evaluation demonstrated that our technique identifies potential risks between real-world applications with perfect accuracy, supports a scalable analysis on a large number of applications, and successfully aids end-users' risk assessments.

Trends on Non-contact Haptic Display Technology (비접촉식 촉감 디스플레이 기술 동향)

  • Hwang, I.;Kim, J.R.;Yun, S.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.5
    • /
    • pp.95-102
    • /
    • 2018
  • With the widespread use of multifunctional devices, haptic sensation is a promising type of sensory channel because it can be applied as an additional channel for transferring information for traditional audiovisual user interfaces. Many researchers have shed new light on non-contact haptic displays for their potential use on ambient and natural user interfaces. This paper introduces several of the latest schemes for creating a mid-air haptic sensation based on their transfer medium: ultrasonic phased arrays, air nozzles, thermal and plasmonic lasers, and electromagnets. We describe the principles used in delivering haptic sensation in each technology, as well as state-of-the-art technologies from leading research groups, and brief forecasts for further research directions.

Analyses of RFID system architecture based on Mobile agent scheme (모바일 에이전트 기법을 이용한 RFID 시스템 구조의 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.797-800
    • /
    • 2009
  • RFID enabled credit cards are becoming increasingly popular as contactless credit cards. We envision a future where RFID credit cards will be used for online shopping. RFID system has tremendous potential to render electronic payments more secure than normal credit cards. The word RFID enabled credit cards may bring in mixed passion, enthusiasm and perhaps even rage! This is partly paranoia and partly reality. The reality is that an intruder can read RFID cards without the user even noticing it. This brings in a zone of discomfort and leads to paranoia. Certain interactivity should exist to bring back this comfort to the user. This paper tries to make an effort in that direction. In this paper we propose mobile phone based architecture for secured electronic payments using RFID credit cards.

  • PDF

A Study on User Authentication Method for Foldable Screen-Based Devices (폴더블 스크린 기반 기기 사용자 인증기법 연구)

  • Choi, Dongmin
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.3
    • /
    • pp.440-447
    • /
    • 2021
  • Smartphones are currently being produced with similar functions, shapes, and software. The foldable smartphone is a product that dramatically changed the shape of the existing smartphone. Therefore, it affects the functions and software. In this paper, we analyze the potential security vulnerability of current mobile authentication methods by dividing them into two parts, security vulnerabilities of non-foldable smartphones, and security vulnerability that appears with the changed smartphone structure. According to the analysis result, the classic and current mobile user authentication methods appears to be easily affected by the smartphone display structure. Finally, we propose an appropriate authentication method as well as the concept of security measures for smartphones with foldable screen. Our method shows that it is more secure than the conventional authentication methods in foldable display smartphone.

ACCELERATED CONSTRUCTION OF URBAN INTERSECTIONS WITH PORTLAND CEMENT CONCRETE PAVEMENT (PCCP)

  • Kamran M. Nemati
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.886-891
    • /
    • 2005
  • The frequent maintenance required on some asphalt concrete (AC) pavement sections has made reconstruction with Portland Cement Concrete Pavement (PCCP) a feasible alternative. However, many constructability issues need to be addressed in order to realize the full potential of this alternative. Accelerated paving encompasses three classes of activities: methods to accelerate the rate of strength gain, methods to minimize the construction time, and traffic control strategies to minimize user delay. Three major AC intersections with severe rutting problems were reconstructed with PCCP. The entire reconstruction of each intersection, including demolition of the AC pavement and its replacement with PCCP, took place over a period of three days, starting on Thursday evening and opening the intersection to the traffic on Sunday afternoon. This paper discusses the use of PCCP for accelerated reconstruction of major urban intersections with minimal user and traffic disruption, using innovative construction techniques and traffic management optimization principles and demonstrates that concrete pavements can be constructed efficiently and quickly.

  • PDF