• 제목/요약/키워드: Information Usage Pattern

검색결과 275건 처리시간 0.024초

An analysis on the web usage pattern graph using web users' access information (웹 이용자의 접속 정보 분석을 통한 웹 활용 그래프의 구성 및 분석)

  • Kim, Hu-Gon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 한국경영과학회 2005년도 추계학술대회 및 정기총회
    • /
    • pp.422-440
    • /
    • 2005
  • There are many kinds of research on web graph, most of them are focus on the hyperlinked structure of the web graph. Well known results on the web graph are rich-get-richer phenomenon, small-world phenomenon, scale-free network, etc. In this paper, we define a new directed web graph, so called the Web Usage Pattern Graph (WUPG), that nodes represent web sites and arcs between nodes represent a movement between two sites by users' browsing behavior. The data to constructing the WUPG, approximately 56,000 records, are gathered in the Kyungsung University. The results analysing the data summarized as follows: (i) extremely rich-get-richer phenomenon (ii) average path length between sites is significantly less than the previous one (iii) less external hyperlinks, more internal hyperlinks

  • PDF

An Analysis on the Complementarity and Substitutability of the Telecommunications Services in Usage Pattern Analysis (이용행태 분석을 통한 통신서비스 보완 및 대체성 분석)

  • Ahn, Choon-Soo;Hwang, Moon-Young;Lee, Dong-Hyung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • 제34권4호
    • /
    • pp.120-128
    • /
    • 2011
  • Recent development of communication technology and evolution of telecommunications services, various needs of users are giving Telecom operators difficulties in discovering new services and its promotion strategies. In addition, at the launching of new services, if carriers does not consider complementary and substitution relationships with competing services or self-encroachment problem with the existing service profitability is reduced or lost in the current market. In this study, by analyzing usage pattern of telecommunications services respect to changes in supply and demand environment, the complementarity/substitutability analysis and systematic analytical framework is proposed. This study proposes approaches to establish mobile operators' business strategies and to identify new services demand.

A Technique to Analyze Heap Usage of Java Programs Using Code Inserting (코드삽입을 이용한 자바프로그램의 힙 사용정보 분석기법)

  • Joo, Seong-Yong;Jo, Jang-Wu
    • Journal of the Korea Society of Computer and Information
    • /
    • 제12권2호
    • /
    • pp.29-36
    • /
    • 2007
  • In the Java a profiler interface such as JVM TI is provided for communication between a Java virtual machine and a profiler. The JVM TI specification, however does not require an implementation of a profiler interface. Consequently the JVM without an implementation of a profiler interface cannot use a profiler with the JVM TI. For solving the problem, we propose a technique which analyzes heap usage without a profiler interface. This technique inserts codes to extract heap usage into source files in the Java. We implemented a code inserter to verify the proposed technique. We experimented with Java programs that are frequently used and opened. the experimental result presents the number of created objects. the maximum number of allocated objects, and the used pattern of the objects.

  • PDF

Novel Anomaly Detection Method for Proactive Prevention from a Mobile E-finance Accident with User"s Input Pattern Analysis (모바일 디바이스에서의 전자금융사고 예방을 위한 사용자입력패턴분석 기반 이상증후 탐지 방법)

  • Seo, Ho-Jin;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제21권4호
    • /
    • pp.47-60
    • /
    • 2011
  • With the increase in the use of mobile banking service, mobile banking has become an attractive target to attackers. Even though many security measures are applied to the current mobile banking service, some threats such as physical theft or penetration to a mobile device from remote side are still remained as unsolved. With aiming to fill this void, we propose a novel approach to prevent e-financial incidents by analyzing mobile device user's input patterns. This approach helps us to distinguish between original user's usage and attacker's usage through analyzing personal input patterns such as input time-interval, finger pressure level on the touch screen. Our proposed method shows high accuracy, and is effective to prevent the e-finance incidents proactively.

Mobile Application Updates: User Responses and Unintended Consequences (모바일 어플리케이션 업데이트 분석: 사용자 반응과 의도하지 않은 결과를 중심으로)

  • Hyung-Keun Song;Byungwan Koh
    • Information Systems Review
    • /
    • 제21권2호
    • /
    • pp.91-115
    • /
    • 2019
  • The updates in the mobile application market have been widely used as strategic marketing tools. It has been used to (i) improve the visibility of an application, (ii) enhance the value of an applicationand strengthen the loyalty of current users, and (iii) expand the market by adding additional features or functions. A number of studies and anecdotal evidence have highlighted the importance of these updates in the mobile application market. However, not all updates in the mobile application market have been successful. Snapchat, for instance, lost 3 million users in three months after it rolled out a major update in November 2017. In this study, we investigate the impact of updates on the usage patterns of users in the mobile application market using MAU (Monthly Active Users), usage frequency, and usage time that we collected from a company that provides mobile application usage statistics.

Utilization of Log Data Reflecting User Information-Seeking Behavior in the Digital Library

  • Lee, Seonhee;Lee, Jee Yeon
    • Journal of Information Science Theory and Practice
    • /
    • 제10권1호
    • /
    • pp.73-88
    • /
    • 2022
  • This exploratory study aims to understand the potential of log data analysis and expand its utilization in user research methods. Transaction log data are records of electronic interactions that have occurred between users and web services, reflecting information-seeking behavior in the context of digital libraries where users interact with the service system during the search for information. Two ways were used to analyze South Korea's National Digital Science Library (NDSL) log data for three days, including 150,000 data: a log pattern analysis, and log context analysis using statistics. First, a pattern-based analysis examined the general paths of usage by logged and unlogged users. The correlation between paths was analyzed through a χ2 analysis. The subsequent log context analysis assessed 30 identified users' data using basic statistics and visualized the individual user information-seeking behavior while accessing NDSL. The visualization shows included 30 diverse paths for 30 cases. Log analysis provided insight into general and individual user information-seeking behavior. The results of log analysis can enhance the understanding of user actions. Therefore, it can be utilized as the basic data to improve the design of services and systems in the digital library to meet users' needs.

Usage Pattern Analysis and Comparative Analysis among User Groups of Web Sites Using Process Mining Techniques (프로세스 마이닝을 이용한 웹 사이트의 이용 패턴 분석 및 그룹 간 비교 분석)

  • Kim, Seul-Gi;Jung, Jae-Yoon
    • The Journal of Bigdata
    • /
    • 제2권2호
    • /
    • pp.105-114
    • /
    • 2017
  • Today, many services are supported on the web sites. Analysis of usage patterns of web site visitors is very important to optimize the use and efficiency of the web sites. In this study, analysis of usage patterns and comparative analysis of user groups were conducted by analyzing web access log provided by BPI Challenge 2016. This data provides access logs to the web site in the IT system of a Dutch Employee Insurance Agency (UWV). The customer information, and the click data describing the customers' behavior when using the agency's web site. In this study, we use process mining techniques to analyze the usage patterns of customers and the characteristics of customer groups, and ultimately improve the service quality of customers using web services.

  • PDF

Internet News Frame: A Study of News Coverage Trends in Longitudinal Internet Media Development (인터넷 뉴스프라임: 인터넷 미디어발달의 장기적인 뉴스보도 경향연구)

  • Kweon, Sang-Hee
    • Korean journal of communication and information
    • /
    • 제30권
    • /
    • pp.35-87
    • /
    • 2005
  • This research explores the empirical confirmation of the Internet development including from the period of innovation to the time of social-cultural use in today. The research focused on how tradition news media rover about the Internet developed from early to today, and understanding the media characteristics on the each stages from news frame. The research Is designed to conduit content analysis from 1989 to 2004, then this research is divided four(4) stages of the Internet development: innovation, diffusion, commercial usage, social-cultural usage. The results shows that there are significant different coverage by the stages. First of all, the news coverage pattern shift from technology focused on early stages to social usage focused on the later stages. This research confirms that the ratio of the seriation(technology) coverage defined when social usage is increased, on the other hand skeumorphs(social usage and content) coverage is increased in the commercial and social usage stages. This coverage pattern among news media does not such a big different and there is no competitive coverage. Moreover, the news coverage shifted from thematic coverage on early stages to episodic coverage while the number of usage increasing. In addition, the tone of coverage has not been changed significantly.

  • PDF

An Efficient Image Description Method Using Circular Scanning Pattern (회전 주사 방식에 의한 효율적인 영상 특징 기술 방법)

  • 송호근;강응관
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 1999년도 추계종합학술대회
    • /
    • pp.189-192
    • /
    • 1999
  • This paper propose an efficient image description method using circular scanning pattern. The method Is based on the fart that the main information of an image tends to consentrate on its central part. By the method, we ran describe color and spacial information of the mage at a time, efficiently. Therefore, we can reduce the computational expense and memory usage needed to index the image more than the conventional one does.

  • PDF