• Title/Summary/Keyword: External User

Search Result 525, Processing Time 0.023 seconds

A Study on the External User Service Systems in University Libraries (대학도서관의 특별이용자제도에 관한 연구)

  • 송영희
    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.4
    • /
    • pp.449-466
    • /
    • 2001
  • This study examines the regulations and circulation policies regarding external users of twenty four university libraries opening their services to communities. Also several considerations are discussed about introducing external user library services for communities.

  • PDF

A Study on User Authentication for Roaming in Mobile Device (모바일 디바이스의 로밍을 위한 사용자 인증에 관한 연구)

  • Kang, Seo-Il;Park, Choon-Sik;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.343-350
    • /
    • 2008
  • In ubiquitous environment, a user has been provided with service and mobility using various devices. The users' network can be divided into a home network (a user belongs to the network through an authentication server) and an external network (when a user moves or external authentication server is). Users can use a mobile device or a device at an external network. In this paper, when a user has access to a service in an external network with a mobile device, there is a skim that a service is securely provided by roaming private information (encryption key etc${\cdots}$) and a skim which gives access to a home network using a device in an external network. If you use these skims, roaming is provided in order that you can use a secure service in an external network.

A Study on the Improvement of the External User Services in University Libraries (대학도서관 외부이용자제도 개선방안에 관한 연구)

  • Jeong, Dae-Keun;SaKong, Bok-Hee
    • Journal of Korean Library and Information Science Society
    • /
    • v.41 no.4
    • /
    • pp.269-293
    • /
    • 2010
  • Opening university library doors to the community is essential to meeting their demands and it is also the duty of university libraries. Since opening doors of university libraries have become more and more significant, this study analysed the conditions of the university libraries that have the open-door policy to external users and carried out an analysis of problems caused by the open-door policy. The following alternatives were suggested : the introduction of the membership system about the external users, the role division of university library and local public libraries, reinforcement of external library user education, and access management about external users.

  • PDF

Convenient User Authentication Mechanism Using only User Identification (사용자 ID만을 활용한 간편한 사용자 인증 방안)

  • Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.11
    • /
    • pp.501-508
    • /
    • 2015
  • Most web sites, information systems use the ID/Password technique to identify and authenticate users. But ID/Password technique is vulnerable to security. The user must remember the ID/Password and, the password should include alphabets, numbers, and special characters, not to be predicted easily. User also needs to change your password periodically. In this paper, we propose the user authentication method that the user authentication information stored in the external storage to authenticate a user. If another person knows the ID/Password, he can't log in a system without the external storage. Whenever a user logs in a system, authentication information is generated, and is stored in the external storage. Therefore, the proposed user authentication method is the traditional ID/Password security technique, but it enhances security and, increases user convenience.

Exploring the Influence of the Internet Shopping Mall's Quality Factors on User Trust and Acceptance (인터넷 쇼핑몰이 갖는 품질요인이 사용자 신뢰와 수용에 미치는 영향에 대한 연구)

  • Lee Kung-Chang;Kang Byung-Uk;Suh Bomil;Kim Jong-Uk
    • Korean Management Science Review
    • /
    • v.22 no.1
    • /
    • pp.27-46
    • /
    • 2005
  • As the electronic commerce has grown dramatically, visiting the Internet shopping malls is accepted as one of our daily life. Despite many studies about user acceptance of the Internet shopping malls, it still remains unanswered how the Internet shopping mall's three quality factors such as system qualify, Information qualify, and service quality affect user trust, and eventually user acceptance of the mall. To investigate this issue, we propose a research model in which six external factors such as three qualify factors as well as self-efficacy, subjective norm, and trust have a significant impact on user's attitude and intention to use the mall. After garnering 244 valid questionnaires from users, we analyze them with structural equation modeling. Experiment results show that the Internet shopping mall's three quality factors such as system quality, information qualify, and service quality significantly Influence user trust for the mall, which in turn impacts user's perceived usefulness, attitude toward using the mall. Another external factors such as self-efficacy and subjective norm also influence user's perceived ease of use and perceived usefulness respectively, affecting user's attitude altogether. Implications and further research directions are presented.

An Empirical Study on the Factors Influencing User Attitude Toward Smart Home (스마트홈 사용자 태도에 영향을 미치는 요인에 관한 연구)

  • Lee, Mi Sook;Jeong, Gap Yeon
    • Journal of Information Technology Services
    • /
    • v.17 no.3
    • /
    • pp.157-169
    • /
    • 2018
  • This study aims to examine the factors influencing user attitude toward Smart Home service as the demand of Smart Home service is increasing and it somewhat involves privacy risk. To this end, the research model includes five independent variables, trust in service provider, perceived privacy risk, self efficacy, interpersonal influence, and external influence, influencing the attitude toward Smart Home service. So, this study aims to analyze which variable is the most critical and influential among the five factors and suggest the direction of Smart Home industries. This study first reviews the literature on Smart Home services and describes its Korean situation. Data were collected from residents living in a smart apartment complex. The results show that (1) users have a very positive attitude toward Smart Home service in total, (2) trust in service providers, self efficacy, and interpersonal influence positively impact user attitude toward Smart Home service and interpersonal influence is the most influential variable, however, (3) perceived privacy risk and external influence dose not significantly impact it. These results imply that the role of service providers, self efficacy, and interpersonal influence are important factors on the user attitude toward Smart Home service. Finally, the study's findings and limitations are discussed and potential avenues for future research are suggested.

Semi-automatic Field Morphing : Polygon-based Vertex Selection and Adaptive Control Line Mapping

  • Kwak, No-Yoon
    • International Journal of Contents
    • /
    • v.3 no.4
    • /
    • pp.15-21
    • /
    • 2007
  • Image morphing deals with the metamorphosis of one image into another. The field morphing depends on the manual work for most of the process, where a user has to designate the control lines. It takes time and requires skills to have fine quality results. It is an object of this paper to propose a method capable of realizing the semi-automation of field morphing using adaptive vertex correspondence based on image segmentation. The adaptive vertex correspondence process efficiently generates a pair of control lines by adaptively selecting reference partial contours based on the number of vertices that are included in the partial contour of the source morphing object and in the partial contour of the destination morphing object, in the pair of the partial contour designated by external control points through user input. The proposed method generates visually fluid morphs and warps with an easy-to-use interface. According to the proposed method, a user can shorten the time to set control lines and even an unskilled user can obtain natural morphing results as he or she designates a small number of external control points.

A Study on PIN-based Authentication and ID Registration by Transfer in AAA System (AAA시스템에서의 이동에 따른 PIN 기반의 인증 및 ID 등록에 관한 연구)

  • Kang Seo-Il;Lee Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.359-368
    • /
    • 2006
  • AAA(Authentication, Authorization, Accounting) is the service that offers authentication, authorization, and accounting method, and every terminal that accesses the network requires this AAA service. The authentication process of a mobile terminal is as follows: a mobile phone accesses an authentication server in a home network via the authentication service in an external network, which receives the authentication result. And, for the home authentication server to offer secure service, a unique key is distributed for the secure communication between the external agent and the user, the external agent and the home authentication server, and the user and the home authentication server. This paper discusses and proposes the key distribution for secure communication among external authentication servers when a mobile terminal travels to an external network. As the proposed method does not require the home authentication server to reissue another authentication when a user travels to other external networks, it reduces the overload in the home authentication server. It can also distribute a PIN-driven key.

Typology of the Scope of Generalization in User Behavior Study (이용자 행태 연구방법론상의 일반화 영역 유형에 관한 연구)

  • Kim Yang-Woo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.2
    • /
    • pp.435-455
    • /
    • 2006
  • While numerous studies have empirically investigated user behavior in LIS research community, less research has attempted to examine such studies in methodological perspective. Reflecting this, relevant studies have suggested the need to develop methodological framework for such studies. This study conducted content analyses of user behavior studies recently published in JASIST and analyzed factors which affect the external validity of result of such researches. The findings revealed various types and cases related to the generalization of the study results. Based on these, a methodological framework for user behavior studies were suggested.

Visualization Method of Social Networks Service using Message correlations based on Distributed Parallel Processing (메시지의 상관관계를 이용한 분산병렬처리 기반의 소셜 네트워크 서비스 시각화 방법)

  • Kim, Yong-Il;Park, Sun;Ryu, Gab-Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1168-1173
    • /
    • 2013
  • This paper proposes a new visualization method based on cloud technique which uses internal relationship of user correlation and external relation of social network to visualize user relationship hierarchy. The visualization method of this paper can well represent user-focused relationship hierarchy on social networks by a correlation matrix. The importance of a access node reflects into user relationship hierarchy by exploiting external relation of social network. Users of the method can well understand user relationships on account of representing user relationship hierarchy from social networks. In addition, the method use hadoop and hive for distribution storing and parallel processing which the result of calculation visualizes hierarchy graph using D3.