• Title/Summary/Keyword: User Attribute

Search Result 365, Processing Time 0.027 seconds

A Usability Assessment Metric for Ubiquitous Services: Quantification of the Interactivity Attribute in Inter-personal Services

  • Lee, Joo-Hwan;Song, Joo-Bong;Yun, Myung-Hwan
    • Journal of the Ergonomics Society of Korea
    • /
    • v.31 no.1
    • /
    • pp.63-76
    • /
    • 2012
  • Objective: The main objective of this study is to propose a user-centered assessment metric for ubiquitous services. Background: As the ubiquitous era took off, the interactions between ubiquitous services and users have come to take an important position. It is essential to conceptualize a new assessment model that considers human-system interaction capability with a user-centered design perspective. Method: The evaluation model for the interactivity of ubiquitous service was approached from the concept of usability and inter-personality of services. As a validation study, suggested assessment metric was utilized to evaluate the u-Home service. Priority weighting of each assessment metric was derived using the quantification type-I analysis. Results: To evaluate interactivity, this study suggested a quantitative metric for user testing performed after classifying the interactivity characteristics to contextualization; ubiquity; user experience; and service capability. Conclusion: This study suggest the metric for the ubiquitous service that are experienced in real life, and introduced the concept of ubiquitous service interactivity. Application: The suggested evaluation metric can be used to evaluate interactivity level of ubiquitous service and identify the potential problem and usability requirements at the early stage of service development.

A study on Mobile SNS Attributes Effects on Information share, Relationship formation, and User satisfaction (모바일 SNS속성이 관계형성과 정보공유를 매개로 사용자 만족도에 미치는 영향)

  • Sim, Sun-Hee;Moon, Jae-Young
    • Journal of Korean Society for Quality Management
    • /
    • v.40 no.1
    • /
    • pp.60-72
    • /
    • 2012
  • This research conducted a survey targeting mobile SNS users in order to see whether mobile SNS attribute( accessibility, usefulness, newness, connectivity) through the medium of information share and relationship formation had a positive influence on user satisfaction. The results of the analysis showed that usefulness and accessibility had a significant influence on information share, while accessibility and connectivity had a significant influence on relationship formation. Information share and relationship formation both had a significant influence on user satisfaction. Based on this research, an angle of approach different from the business transactions and information services offered in existing mobile networks is necessary when corporations provide SNS through mobiles. When considering that the most important part in the use of mobile SNS is the social component, this can be actively used for the development and marketing of SNS services. Therefore, the SNS provider must focus its efforts on finding a method to stimulate user sensibilities in order to increase customer satisfaction and draw out continuous usage.

A Method of Sensory Effect Metadata Generation Based on User Feedback Information (사용자 피드백 정보 기반 실감효과 메타데이터 생성 방법)

  • Kim, Cheol Min;Heo, Yong Soo;Kim, Eun Seok
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.7
    • /
    • pp.802-812
    • /
    • 2018
  • Recently, there are several active and vibrant studies on Realistic Media that try to provide the immersion and the presence by adding sensory effects to video. Because existing sensory effects on Realistic Media are produced through experts and automation programs on sensory effects, there is a limit to fill up the gap of user satisfaction which comes from the diversity of cybernauts. In this paper, we propose a method to improve the satisfaction with sensory effects by collecting and analyzing user's response information, and applying the result to the attributes of sensory effects. The proposed method allows you to produce the Sensory Effect Metadata effectively by analyzing users' biometric data and subjective satisfaction with realistic media experience, measuring the weighted value to revise the effects, and applying to the attribute of sensory effect. The experimental result shows that the proposed method improves the satisfaction with realistic content by generating the revised Sensory Effect Metadata in response to user's experiential feedback information.

Implementation of an User-guided Classification Tailoring System (사용자 요구에 기반한 맞춤형 분류체계 생성기법 구현)

  • Jang, Du-Seok;Chun, Jong-Hoon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.3
    • /
    • pp.193-210
    • /
    • 2007
  • In order for a classification system to be useful in every day business environments, it has to reflect peculiar characteristics of enterprises and organizations. By automating the generation process of classification, the overall operation of classification system becomes effective and efficient. However, in order for it to be really useful, human input and interventions are needed from the very beginning phase of the classification generation. This paper proposes an user-guided classification generation algorithm, in which the user inputs a specific level of the classification that she/he wants. Also we propose and implement manipulation operators to tailor the initial classification into the shape that user wants.

  • PDF

Attribute-based authentication scheme in IPTV broadcasting system (IPTV 방송 시스템에서의 속성기반 사용자 인증 기법)

  • Lee, Ji-Seon;Kim, Hyo-Dong
    • Journal of Broadcast Engineering
    • /
    • v.14 no.3
    • /
    • pp.280-287
    • /
    • 2009
  • An IPTV (Internet Protocol Television) technology is the new convergence technology of the telecommunication and broadcasting which provides various bidirectional TV services. To provide these services only to legal subscribers, mutual authentication between set-top box connected with TV set and the smart card owned by a subscriber is needed. In this paper, we propose an attribute-based mutual authentication scheme that only someone who is satisfied with some attributes, such as titles or departments, can access the contents provided by the IPTV service in an organization. We also show that the proposed scheme is secure. Our proposed scheme has a virtue that user can access various services, provided by an organization where he/she belongs to, according to their attributes with only one time registration. As far as we know, this is the first attribute-based authentication scheme which can be applied to any organizations in IPTV environments.

Study on a Secure Authentication and Authorization Protocol based on Kerberos (커버로스 기반의 안전한 인증 및 허가 프로토콜 에 관한 연구)

  • 김은환;김명희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.737-749
    • /
    • 2004
  • Kerberos authenticates clients using symmetric-key cryptography, and supposed to Oust other systems of the realm in distributed network environment. But, authentication and authorization are essential elements for the security. In this paper, we design an efficient and secure authentication/authorization mechanism by introducing the public/private-key and installing the proxy privilege server to Kerberos. In the proposed mechanism, to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we reduce the number of keys by simplifying authentication steps. Proxy privilege server certifies privilege request of client and issues a privilege attribute certificate. Application server executes privilege request of client which is included a privilege attribute certificate. Also, a privilege attribute certificate is used in delegation. We design an efficient and secure authentication/authorization algorithm with Kerberos.

Constant-Size Ciphertext-Policy Attribute-Based Data Access and Outsourceable Decryption Scheme (고정 크기 암호 정책 속성 기반의 데이터 접근과 복호 연산 아웃소싱 기법)

  • Hahn, Changhee;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.43 no.8
    • /
    • pp.933-945
    • /
    • 2016
  • Sharing data by multiple users on the public storage, e.g., the cloud, is considered to be efficient because the cloud provides on-demand computing service at anytime and anywhere. Secure data sharing is achieved by fine-grained access control. Existing symmetric and public key encryption schemes are not suitable for secure data sharing because they support 1-to-1 relationship between a ciphertext and a secret key. Attribute based encryption supports fine-grained access control, however it incurs linearly increasing ciphertexts as the number of attributes increases. Additionally, the decryption process has high computational cost so that it is not applicable in case of resource-constrained environments. In this study, we propose an efficient attribute-based secure data sharing scheme with outsourceable decryption. The proposed scheme guarantees constant-size ciphertexts irrespective of the number of attributes. In case of static attributes, the computation cost to the user is reduced by delegating approximately 95.3% of decryption operations to the more powerful storage systems, whereas 72.3% of decryption operations are outsourced in terms of dynamic attributes.

Multi-Attribute based on Data Management Scheme in Big Data Environment (빅 데이터 환경에서 다중 속성 기반의 데이터 관리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.263-268
    • /
    • 2015
  • Put your information in the object-based sensors and mobile networks has been developed that correlate with ubiquitous information technology as the development of IT technology. However, a security solution is to have the data stored in the server, what minimal conditions. In this paper, we propose a data management method is applied to a hash chain of the properties of the multiple techniques to the data used by the big user and the data services to ensure safe handling large amounts of data being provided in the big data services. Improves the safety of the data tied to the hash chain for the classification to classify the attributes of the data attribute information according to the type of data used for the big data services, functions and characteristics of the proposed method. Also, the distributed processing of big data by utilizing the access control information of the hash chain to connect the data attribute information to a geographically dispersed data easily accessible techniques are proposed.

FolkRank++: An Optimization of FolkRank Tag Recommendation Algorithm Integrating User and Item Information

  • Zhao, Jianli;Zhang, Qinzhi;Sun, Qiuxia;Huo, Huan;Xiao, Yu;Gong, Maoguo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.1-19
    • /
    • 2021
  • The graph-based tag recommendation algorithm FolkRank can effectively utilize the relationships between three entities, namely users, items and tags, and achieve better tag recommendation performance. However, FolkRank does not consider the internal relationships of user-user, item-item and tag-tag. This leads to the failure of FolkRank to effectively map the tagging behavior which contains user neighbors and item neighbors to a tripartite graph. For item-item relationships, we can dig out items that are very similar to the target item, even though the target item may not have a strong connection to these similar items in the user-item-tag graph of FolkRank. Hence this paper proposes an improved FolkRank algorithm named FolkRank++, which fully considers the user-user and item-item internal relationships in tag recommendation by adding the correlation information between users or items. Based on the traditional FolkRank algorithm, an initial weight is also given to target user and target item's neighbors to supply the user-user and item-item relationships. The above work is mainly completed from two aspects: (1) Finding items similar to target item according to the attribute information, and obtaining similar users of the target user according to the history behavior of the user tagging items. (2) Calculating the weighted degree of items and users to evaluate their importance, then assigning initial weights to similar items and users. Experimental results show that this method has better recommendation performance.

Effects of E-coupon attributes, Perceived risk in Internet shopping malls on Intention to continuously use online coupons through the User satisfaction - moderating effects of coupon type and gender - (인터넷 쇼핑몰에서의 e-쿠폰 속성, 지각된 위험이 사용자 만족도를 매개로 인터넷쿠폰의 지속적 사용의도에 미치는 영향 - 쿠폰유형과 성별의 조절효과를 중심으로 -)

  • Sim, Sun-Hee;Kim, Ha-Kyun
    • Management & Information Systems Review
    • /
    • v.30 no.2
    • /
    • pp.1-25
    • /
    • 2011
  • In this study, a survey of online coupon user in their 20's and 30's was undertaken to explore how e-coupon attribute, perceived risk affect the intention to continuously use online coupons through mediation of online coupon user satisfaction. Four variables were used as E-coupon attribute variables(economy, amusement, reliability, usefulness) with coupon type and gender being used as moderating variables. The analysis results of relationship between e-coupon attributes, perceived risk and online coupon user satisfaction indicated that amusement, usefulness significantly affected online coupon user satisfaction, and this, in turn, significantly affected the intention to continuously use online coupons. In addition, the test of difference between groups in coupon type and gender, two moderating variables used in this study, found that with respect to coupon type, a moderating effect existed in reliability, usefulness whereas for gender, a moderating effect existed in only reliability. It is considered that this study will provide a credible evidence basis for Internet shopping malls in establishing a coupon promotion strategy including a specific promotional mix best suited to their needs and resources, while implicating that offering highly reliable online coupons will contribute to enhancing satisfaction level among customers using online coupons.

  • PDF