• Title/Summary/Keyword: Analysis of User Behavior

Search Result 767, Processing Time 0.028 seconds

A Modeling Methodology for Analysis of Dynamic Systems Using Heuristic Search and Design of Interface for CRM (휴리스틱 탐색을 통한 동적시스템 분석을 위한 모델링 방법과 CRM 위한 인터페이스 설계)

  • Jeon, Jin-Ho;Lee, Gye-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.179-187
    • /
    • 2009
  • Most real world systems contain a series of dynamic and complex phenomena. One of common methods to understand these systems is to build a model and analyze the behavior of them. A two-step methodology comprised of clustering and then model creation is proposed for the analysis on time series data. An interface is designed for CRM(Customer Relationship Management) that provides user with 1:1 customized information using system modeling. It was confirmed from experiments that better clustering would be derived from model based approach than similarity based one. Clustering is followed by model creation over the clustered groups, by which future direction of time series data movement could be predicted. The effectiveness of the method was validated by checking how similarly predicted values from the models move together with real data such as stock prices.

Design and Implementation of Web Server for Analyzing Clickstream (클릭스트림 분석을 위한 웹 서버 시스템의 설계 및 구현)

  • Kang, Mi-Jung;Jeong, Ok-Ran;Cho, Dong-Sub
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.945-954
    • /
    • 2002
  • Clickstream is the information which demonstrate users' path through web sites. Analysis of clickstream shows how web sites are navigated and used by users. Clickstream of online web sites contains effective information of web marketing and to offers usefully personalized services to users, and helps us understand how users find web sites, what products they see, and what products they purchase. In this paper, we present an extended web log system that add to module of collection of clickstream to understand users' behavior patterns In web sites. This system offers the users clickstream information to database which can then analyze it with ease. Using ADO technology in store of database constructs extended web log server system. The process of making clickstreaming into database can facilitate analysis of various user patterns and generates aggregate profiles to offer personalized web service. In particular, our results indicate that by using the users' clickstream. We can achieve effective personalization of web sites.

Study on the User's Cognition of Public Libraries' Service for Senior Citizen : Through Survey of Senior Citizens' Welfare Center Users (공공도서관 노령자서비스에 대한 잠재이용자 인식 연구 - 대전지역 노인복지관 이용자를 중심으로 -)

  • Kim, Young-Shin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.2
    • /
    • pp.55-79
    • /
    • 2007
  • As Korea enters into an aging society, the problem of information literacy against senior citizens is becoming a socioeconomic issue in Korea. Since most of the public libraries in Korea are already equipped with infrastructures for information dissemination, they may be able to solve this problem most effectively among public organizations. In this study in order to investigate senior citizen's general understanding of public library, cognizance of the programs for them. their information request levels, preferred contents, information seeking behavior, etc., 176 participants in educational programs at two senior citizens' welfare center were interviewed and surveyed with structured questionnaires. The statistical analysis of the surveyed data has shown that the senior citizen's general understanding of public library was very poor and that those under 75 years old preferred educational programs and those over 75 preferred recreational ones. Recommendations were made based on the results of the analysis.

Color-based Emotion Analysis Using Fuzzy Logic (퍼지 논리를 이용한 색채 기반 감성 분석)

  • Woo, Young-Woon;Kim, Chang-Kyu;Kim, Chee-Yong
    • Journal of Digital Contents Society
    • /
    • v.9 no.2
    • /
    • pp.245-250
    • /
    • 2008
  • Psychology of color is a research field of psychology for studying human's behavior connected with color. Color carries symbolism and image while sharing psychological consensus with human. Each color has a respective image such as hope, passion, love, life, death, and so on. Peculiar stimuli by colors on these images have great influence on human's emotion and psychology. We therefore proposed a method for understanding human's state of emotion based on colors in this paper. In order to understand human's state of emotion, we analyzed color information used to model a room by a user and then described frequencies of each color as percent using fuzzy inference rules by membership values of fuzzy membership functions for colors used for modeling the room. When we applied the proposed color-based emotion analysis method to emotional state based on colors of Alschuler and Hattwick, we could see the proposed method is efficient.

  • PDF

Improvement of Railway Demand Forecasting Methodology under the Various Transit Fare Systems of Seoul Metropolitan Area (Focused on Mode Share) (수도권 대중교통 요금제의 다양화에 따른 철도 수요예측 방법론의 개선(수단분담을 중심으로))

  • Choe, Gi-Ju;Lee, Gyu-Jin;Ryu, In-Gon
    • Journal of Korean Society of Transportation
    • /
    • v.28 no.2
    • /
    • pp.171-181
    • /
    • 2010
  • The integrated transit fare system of Seoul metropolitan area has given positively evaluated with reduction of user cost and activating the transfer behavior from its opening year, July 2007. However, there were only few research about railway demand forecasting methodology, especially mode share, has conducted under the integrated fare system. This study focuses on the utility estimation by each mode under the integrated fare system, and on the coefficient actualization relates on travel time and travel cost estimation with Household Travel Survey Data 2006. Also the railway demand analysis methodology under various fare systems is presented. The methodology from this study is expected to improve accuracy and usefulness in railway demand analysis.

Artifacts Analysis of GoToWebinar and GoToMeeting (화상 회의 애플리케이션 GoToWebinar 및 GoToMeeting 아티팩트 분석 )

  • Soojin Kang;Giyoon Kim;Yangsun Lee
    • Journal of Platform Technology
    • /
    • v.11 no.1
    • /
    • pp.11-22
    • /
    • 2023
  • Various video conferencing and collaboration applications have emerged due to the global epidemic of new viral infections. In addition to real-time video conferencing, video conferencing applications provide features such as chat and file sharing on various platforms. Because various personal information is stored through functions such as chatting, file and screen sharing, these video conferencing applications are the major target of analysis from a digital forensic investigation. In the case of applications that provide cross-platform, the form of stored data is different depending on the platform. Therefore, to utilize data of video conferencing application for forensic investigation, preliminary research on artifacts stored by platform is required. In this paper, we used the video conferencing applications GoToWebinar and GoToMeeting and analyzed the artifacts generated. As a result, we list the main data from a digital forensic investigation. We identify data stored for each platform provided by GoToWebinar and GoToMeeting and organize artifacts that can estimate user behavior. Also, we classify the data that can be acquired according to the role and environment within the video conference.

  • PDF

Analysis of Malicious Behavior Towards Android Storage Vulnerability and Defense Technique Based on Trusted Execution Environment (안드로이드 저장소 취약점을 이용한 악성 행위 분석 및 신뢰실행환경 기반의 방어 기법)

  • Kim, Minkyu;Park, Jungsoo;Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.73-81
    • /
    • 2021
  • When downloading files using an app or web-based application on the user's mobile phone, the path is set to be saved in the pre-defined default directory. Many applications requiring access to storage, including file managers, require a write or read permission of storage to provide numerous functions and services. This means that the application will have direct access to the download folder where the numerous files downloaded. In this paper, to prove our feasibility of attack using the security vulnerabilities mentioned above, we developed a file hacking function disguised as an encryption function in the file management application. The file that encrypted will be sent to hackers via E-mail simultaneously on the background. The developed application was evaluated from VirusTotal, a malicious analysis engine, was not detected as a malicious application in all 74 engines. Finally, in this paper, we propose a defense technique and an algorithm based on the Trusted Execution Environment (TEE) to supplement these storage vulnerabilities.

The Proactive Threat Protection Method from Predicting Resignation Throughout DRM Log Analysis and Monitor (DRM 로그분석을 통한 퇴직 징후 탐지와 보안위협 사전 대응 방법)

  • Hyun, Miboon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.369-375
    • /
    • 2016
  • Most companies are willing to spend money on security systems such as DRM, Mail filtering, DLP, USB blocking, etc., for data leakage prevention. However, in many cases, it is difficult that legal team take action for data case because usually the company recognized that after the employee had left. Therefore perceiving one's resignation before the action and building up adequate response process are very important. Throughout analyzing DRM log which records every single file's changes related with user's behavior, the company can predict one's resignation and prevent data leakage before those happen. This study suggests how to prevent for the damage from leaked confidential information throughout building the DRM monitoring process which can predict employee's resignation.

Use Case Identification Method based on Goal oriented Requirements Engineering(GoRE) (Goal 지향 요구공학 기반의 유스케이스 식별 방법)

  • Park, Bokyung;Kim, R. Youngchul
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.7
    • /
    • pp.255-262
    • /
    • 2014
  • Our previous research[1] suggested object extraction and modeling method based on Fillmore's case grammar. This approach had not considered of use case extraction and method. To solve this problem, we adopt Fillmore's semantic method as linguistic approach into requirement engineering, which refine fillmore's case grammar for extracting and modeling use cases from customer requirements. This Refined mechanism includes the definition of a structured procedure and the representation of visual notations for 'case' modeling. This paper also proposes the use case decision matrix to identify use case size from extracted use cases based on goal oriented requirement engineering(GoRE), which related with the complexity of use case, and also prioritizes the use cases with this matrix. It demonstrates our proposal with the bank ATM system.

Importance-Satisfaction Analysis of Meditation Forest in Schools - Focusing on Middle Schools in Gwang-Ju City - (명상숲의 중요도-만족도 평가 - 광주광역시 중학교를 대상으로 -)

  • Kang, Taesun;Jeong, Moonsun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.4
    • /
    • pp.68-80
    • /
    • 2019
  • This study is to provide basic data for the user-oriented design for a middle school meditation forest in the future by analyzing the physical environment characteristics of existing middle school meditation forests, the users' utilization behavior, and the degree of the importance satisfaction. For this purpose, 24 evaluation indices based on site characteristics, naturalness, functionality, and the effectiveness of meditation forest sites were selected for analysis of importance satisfaction. We surveyed and analyzed the students and teachers of two middle schools 'A' and 'B' in Gwangju Metropolitan City. The results of this study are as follows. First, the perception and utilization rates of the meditation forests by students was significantly lower than teachers at both schools. 'A' school has a better use and recognition rate than the 'B' school. Second, the purposes of using meditation forests were rest (49.6%), weekday lunchtime (63.6%), with friends (65.0%) or colleagues (60%), and short (less than 10 minutes) rests (68.6%). They preferred flowers (30.0%) and shading plants (28.9%), mainly using shelters (57.9%) and walking trails (37.1%). Third, as a result of the importance of satisfaction analysis, the average score of the 24 items importance (3.81), higher than the satisfaction (3.62). The 24 items positioned in 4 quadrants are as follows: Nine items are in the I quadrant for 'persistent maintenance'. Three items are in the II quadrant for 'priority correction'. Seven items are in the quadrant III for 'low priority in the management and operation'. Five items are in the quadrant IV for 'avoid over effort'. For the comparison of two middle schools' satisfaction, 'A' school satisfaction was higher than 'B' school for 16 items, which showed a statistically significant difference. It is believed that the users in 'A' school are more satisfied than 'B' school because it has more forests and trails, better accessibility, and a variety of plant types and planting areas in the A school meditation forest. The results of the overall satisfaction analysis showed a significant difference between 'A' school (68.0%) and 'B' school (47.2%) as 'A' school has better shelters and trails. The rankings of the most satisfying space are walking trails (1st place) and shelters (2nd place). The reason for the highest satisfaction was for rest (stress relief and emotional support) in both 'A' and 'B' schools.