• Title/Summary/Keyword: Design-centered Framework

Search Result 71, Processing Time 0.027 seconds

A Structured Method of User Data for User Interface Design in Home Network (홈 네트워크에서 UI 디자인을 위한 사용자 데이터 구조화에 관한 연구)

  • Jung, Ji-Hong;Kim, R.Young-Chul;Pan, Young-Hwan
    • Journal of the Ergonomics Society of Korea
    • /
    • v.26 no.2
    • /
    • pp.61-66
    • /
    • 2007
  • The networked home is connected to the external world using a high speed network. The devices inside the house are connected using a wired and wireless network. Acquiring the user data is an essential step for designing the user interface in user centered design. In networked home, the numbers of use cases are exponentially increased because connected use cases are considered. Because the user data for networked home are too complicated, they are acquired and analyzed by a structured methodology. We surveyed 40 people to acquire the context data home and analyzed by 5W1H (Who, Where, What, When, Why, How). We established a framework for the user data using tasks, user, time, space, objects and environment. The data for home context was structured by our framework. This framework makes simple the home context and is helpful for user interface design in home network.

Proposing m-Government Service Architecture Design Using Enterprise Architecture in Mongolia

  • Erdenebold, Tumennast
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.3
    • /
    • pp.261-270
    • /
    • 2014
  • The utilization of the Mobile Government system is having more than a few challenges including complexity of different mobile technologies, determining interoperability among existing systems and infrastructures, and establishing services with secured networks. To get over those challenges, integrated standard, innovative and comprehensive system architecture is required by the M-Government. Hence this study proposed reference EA framework for M-Government system in order to avoid unnecessary duplication of infrastructure deployment and integrate services among different government instructions. The study based on literature review, and current infrastructure and mobile network situation for delivering Government services of Mongolia. The study recommends innovative m-Government system framework used EA, and scope covered mobile service delivery area centered on G4C and C2G perspectives. The Federal Enterprise Architecture Framework has used in this research, and the proposed system service architecture defines the interoperable standards, infrastructure components, applications, and technologies for government institutions in Mongolia to aid interactions necessity among them to provide m-Service.

Software Design Framework for Content Creation (콘텐츠 제작을 위한 소프트웨어 디자인 프레임워크)

  • Oh, Jung-Min;Moon, Nammee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.11
    • /
    • pp.815-822
    • /
    • 2013
  • Nowadays, the various kind of software packages that support content creation consumed in touch-type terminals as an application have come into the market. These softwares have a different style of user task compare to existing user task. The reason why difference style has been appeared for now is because interaction timing has a important role of both content creation and consumption. For this reason, in this paper, we propose a software UI design framework for content creation using MB-UID and UCD model based on task modeling. The proposed framework is made up of five steps: business rule model, creation role model, creation flow model, creation action model, presentation model. Through this framework, we handle the interaction between a content creator and software user interface at the content creation phase. At the same time, we consider a possible interaction type which can occur by consumers at the consumption phase in advance.

A Study on the Task-Centered Instructional Design for the Library-Based Instruction of Teacher-Librarians (사서교사의 도서관 활용 수업을 위한 과제 중심의 교수설계 연구)

  • Hahm, Myung-Sik
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.4
    • /
    • pp.347-361
    • /
    • 2008
  • This study is to present cooperative instructional concept framework for the library-based instruction of teacher-librarians, based on 'Information and the Library' curriculum and instructional design procedure. The development of cooperative instructional units has been initiated in the school libraries, but the research based on instructional theories, including instructional design, is lacking. In this aspect, instructional theories and methodologies for the cooperative instruction of teacher-librarians are important. The cooperative instructional units for teacher-librarians should be developed by 'Information and the Library' curriculum and instructional design procedures. The objectives of the curriculum emphasize information use process based on information task. This study is to present cooperative instructional concept framework, and to help teacher-librarians develop specific cooperative instructional units based on the framework.

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.2
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

Technology Trends, Research and Design of AIM Framework for Authentication Information Management (인증 정보 관리를 위한 기술 동향과 AIM 프레임워크 연구 및 설계)

  • Kim, Hyun-Joong;Cha, Byung-Rae;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.373-383
    • /
    • 2016
  • With mobile-epoch and emerging of Fin-tech, Bio-recognition technology utilizing bio-information in secure method has spread. Specially, In order to change convenient payment services and transportation cards, the combination of biometrics and mobile services are being expanded. The basic concept of authentication such as access control, IA&A, OpenID, OAuth 1.0a, SSO, and Biometrics techniques are investigated, and the protocol stack for security API platform, FIDO, SCIM, OAuth 2.0, JSON Identity Suite, Keystone of OpenStack, Cloud-based SSO, and AIM Agent are described detailed in aspect of application of AIM. The authentication technology in domestic and foreign will accelerate technology development and research of standardization centered in the federated FIDO Universal Authentication Framework(UAF) and Universal 2 Factor Framework(U2F). To accommodate the changing needs of the social computing paradigm recently in this paper, the trends of various authentication technology, and design and function of AIM framework was defined.

Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments (퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가)

  • Jin, Byungwook;Kim, Jonghwa;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

the Development of Personalization Design framework for building Customized Website - focused on the Application of Design Recommender System (고객맞춤형 웹사이트 구현을 위한 개인화 디자인 프레임웍의 개발 - 디자인 추천 시스템의 활용을 중심으로)

  • 서종환
    • Archives of design research
    • /
    • v.16 no.2
    • /
    • pp.23-34
    • /
    • 2003
  • The need for personalized web site design has been increased these days. Current approach for personalized web site design is easily applied to web site with their cost-effective feature, but is hard to provide a more refined personalized service due to its lack of accumulation of user data. In this study, the design recommender system is investigated as a more advanced method for web site design personalization. We provide an overview of current recommender systems, and then outlined a newly developed design recommender system, which employs collaborative filtering technique to provide tailored recommendation for users.

  • PDF

A Study on the Method of Eye Tracking Analysis Based on the Properties in Visual Perception of User -With Emphasis on the Development of Analysis-Framework for Product Design- (사용자의 시각적 인지 특성에 기초한 시선추적 분석 방법에 대한 연구 -제품 디자인을 위한 분석 프레임 개발을 중심으로-)

  • 최민영
    • Archives of design research
    • /
    • v.16 no.4
    • /
    • pp.197-206
    • /
    • 2003
  • Nowadays, the studies on interface and cognition-engineering has become issues of general interest as newly design-methods which analyze the behavior of user on products. However existing studies were mainly done with verbal-centered method which made it difficult for the designer to apply for visual realization. Moreover many mistakes and noises are taken place whenever the designer converts verbal statements and needs of user into visual factors. Therefore the designer needs to analyze visual perception on user and product as visual-centered methods. This study applies the eye tracking method as analysing-instrument and aims to develop the analysis-framework, the concrete techniques of measurement and the application for the product design. At first the nature and the process of visual perception on products are reviewed for developing analysis method. Then the technique of eye tracking and the meaning of fixation and movement are discussed to specify the concrete method. The basic experiment of product can reveal general analysis process, advantage and guideline for the application of eye tracking method. The Study is peformed through the following 4 steps ; to pre-research into product design and visual perception theory ; to identify the concrete experiment method, to measure the fixation/movement data and analyze the raw data, to convert the result of analysis to the visual framework. Finally the major findings and the limits of the study are suggested and summarized.

  • PDF

A Study on Expressive Aspects of Contemporary Architecture (현대건축의 표현양상에 관한 연구)

  • 이근택
    • Journal of the Korean housing association
    • /
    • v.8 no.3
    • /
    • pp.49-58
    • /
    • 1997
  • This Study is to divide aspects broadly that can be suggested with eyes to contemporary issues through assertions of contemporary theorists. verify those on case studies. and search for criteria on the framework of composition on expression of contemporary architecture. As the proposal of this study. the unified approach through a deductive and inductive study in the light of humanism and design creativity can establish the built environment considering human-centered architecture.

  • PDF