• Title/Summary/Keyword: User Change

Search Result 1,500, Processing Time 0.027 seconds

A case study about the user's degree of satisfaction after ERP Implementation (ERP 구축 후 사용자만족도에 관한 사례연구)

  • Moon, Chan-Oh;Kim, Chang-Eun
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.2
    • /
    • pp.175-185
    • /
    • 2008
  • The research it sees the many enterprises ERP system Go-Live after, which fail are appearing to are actuality plentifully with continuous change management insufficiency. One objective of the research it sees the ERP system effect leads simple with successful ERP system embodiment end me, the thing knows, the successful change management to ERP system Go-Live after and there is report that the effect appears. The ERP system Go-Live after the domestic enterprise 2 year above is analysis about the user's degree of satisfaction.

A Study on perceptive characteristics of space type through comparative evaluation on the image rotation of Interior Space (실내공간의 이미지 전회비교 평가를 통한 공간유형별 지각특성에 관한 연구)

  • Choi, Gae-Young;Kim, Jong-Ha;Lee, Sang-Keun
    • Korean Institute of Interior Design Journal
    • /
    • v.19 no.6
    • /
    • pp.179-187
    • /
    • 2010
  • For the user-centered interior space design, a designer needs to carefully focus on the details from which the user must keenly observe or concentrate on the space and how to deliberately check the image of the space. Following this view, for the user-centered interior space design this study analyzes the way which the space is represented from the perspective of the image assessment. The results obtained from this study are summarized as follows: First, this study analyzed the characteristic of space image change in the form of cross-comparison between one space and a rotated space. With analyzing of an eye fixation by showing the space, the space images of "concentration-dispersion" and "strengthening-weaken "have an important role in the analysis of the perception of space. it confirmed that the method of space perception was changed by rotated the space. Second, With changing quantities of image and extraction of deviation from adjective in survey, it quantitatively graps that respondents of feel in space perception by changing the space and "concentration" and 'dispersion" for process of space choice. The results of the research can provide important basis to judge the changing of space perception by visual perception. Third, through the analysis of image change rate and deviation rate, the characteristics of image change with space change can be analyzed. The results derived from the study provide the evidence to support the image change by space rotating.

The Effect of Participation and Attitude in the Process of System Development on the Implementation of Information System (시스템 개발시 사용자 참여와 태도가 시스템의 실행 성과에 미치는 영향)

  • Kim, Jun-Seok;Lee, Hae-Seung
    • Asia pacific journal of information systems
    • /
    • v.4 no.2
    • /
    • pp.247-263
    • /
    • 1994
  • This paper reports the results of a field study investigating the effect of user participation and attitude on the success of information system implementation during the system development process. The theoretical framework for this research is based on the organizational change theory, in which the attitude affects the effects of user's participation. User participation and attitude were defined as independent variables and the performance of system implementation as dependent variable. User participation was defined as a direct participation by end users in the process of the new information system development. This was measured by user's participation/non-participation. User attitude refers to user's opinions or feelings before a new system is developed. This was measured by user's favor toward a system. The performance of system implementation was measured by the surrogate variable, the degree of individual satisfaction on developed system. To achieve the objective of this research, a field research method utilizing questionnaires were employed. They were distributed to 221 users present during and/or after system development. Among 185 questionnaires returned, 175 questionnaires were used for analysis. The major findings can be summarized as follows: First, there was no significant effect of user participation on user satisfaction. Second, there was a significant effect of user attitude on user satisfaction. Third, there was no significant interaction effect of user participation and attitude on user satisfaction. It is worth to note that the user's participation did not have any significant effect on the user's satisfaction. It seems the reason for the above result is due to user's involuntary participation. In fact, the user does not have much leverage in the process of system development, which may result in poor performance of user participation. Since user attitude is an important factor in the success of system implementation, however, a method to overcome unfavorable attitude of user should proceed all others.

  • PDF

Analysis of File Time Change by File Manipulation of Linux System (리눅스 시스템에서의 파일 조작에 따른 시간변화 분석)

  • Yoo, Byeongyeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.21-28
    • /
    • 2016
  • File Time information has a significant meaning in digital forensic investigation. File time information in Linux Ext4 (Extended File System 4) environment is the Access Time, Modification Time, Inode Change Time, Deletion Time and Creation Time. File time is variously changed by user manipulations such as creation, copy and edit. And, the study of file time change is necessary for evidence analysis. This study analyzes the change in time information of files or folders resulting from user manipulations in Linux operating system and analyzes ways to determine real time of malware infection and whether the file was modulation.

The Impacts of Technological Development upon the Locational Change in Manufacturing Industries: A Conceptual Framework. (기술변화가 산업입지에 미치는 영향연구 : '개념적 틀'을 중심으로)

  • 소수진
    • Journal of the Korean Regional Science Association
    • /
    • v.10 no.1
    • /
    • pp.19-37
    • /
    • 1994
  • The past studies on the change of industrial location can be reinterpreted as spatial determinism, decision making process determinism and industrial sturcure determinism according to the view of the mutual operation between the economic activity and spatial structure. From the point of the industrial structure determinism which focuses on the fact that the locational type of production activity can be differenciated by the structural change of industry itself, it is proper to explain the change of industrial location not only by spatial condition but also by containing the fundamental changing causes for the reorganization of the spatial condition. One of the most important changing causes for reorganizing economic space is industrial technology. This study aims to explain the spatialization process of industrial technology and consists of the process of suggesting the hypothesis that the spatialization process is differentiated according to the production organization as the user of industrial technology and the user of industrial technology and the production system as using method. In other words, this study attempts to internalize the technology variable, which has been treated as external in the past studies on the industrial location, as an independent one and consider the production organization and production system as a paramenter, so that it can represent 'conceptual framework' for explaining the change of industrial location.

  • PDF

Application of Multiple Threshold Values for Accuracy Improvement of an Automated Binary Change Detection Model

  • Yu, Byeong-Hyeok;Chi, Kwang-Hoon
    • Korean Journal of Remote Sensing
    • /
    • v.25 no.3
    • /
    • pp.271-285
    • /
    • 2009
  • Multi-temporal satellite imagery can be changed into a transform image that emphasizes the changed area only through the application of various change detection techniques. From the transform image, an automated change detection model calculates the optimal threshold value for classifying the changed and unchanged areas. However, the model can cause undesirable results when the histogram of the transform image is unbalanced. This is because the model uses a single threshold value in which the sign is either positive or negative and its value is constant (e.g. -1, 1), regardless of the imbalance between changed pixels. This paper proposes an advanced method that can improve accuracy by applying separate threshold values according to the increased or decreased range of the changed pixels. It applies multiple threshold values based on the cumulative producer's and user's accuracies in the automated binary change detection model, and the analyst can automatically extract more accurate optimal threshold values. Multi-temporal IKONOS satellite imagery for the Daejeon area was used to test the proposed method. A total of 16 transformation results were applied to the two study sites, and optimal threshold values were determined using accuracy assessment curves. The experiment showed that the accuracy of most transform images is improved by applying multiple threshold values. The proposed method is expected to be used in various study fields, such as detection of illegal urban building, detection of the damaged area in a disaster, etc.

A Method for Automatic Provision of Personalized Community Service using Situation based Self-growing User Model (자가 성장하는 상황 기반 사용자 모델을 이용한 개인화 커뮤니티 서비스 자동 제공 방법)

  • Lee, Chang-Yeul;Cho, Kyoo-Chan;Kim, Hyeon-Sook;Cho, We-Duke
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.7
    • /
    • pp.738-742
    • /
    • 2008
  • The user model is an indispensable factor for providing users with personalized. services in the ubiquitous computing environment. In general user models, services which users prefer should be described in advance so that the system can recognize and interpret them automatically. Also, user's preferences as to the change of situation are not reflected in general user models due to their ignoring the situation. In this paper, we propose the self-growing user model which learns user experience and the system which automatically provides personalized community services through extracting user preferring services by situation.

Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity (Khan 인증기법의 취약점 분석과 개선된 사용자 익명성 제공 인증기법)

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.2
    • /
    • pp.87-94
    • /
    • 2013
  • In this paper, we analyse the weaknesses of authentication scheme preserving user anonymity proposed by Khan et al in 2011 and we propose a new authentication schemes preserving user anonymity that improved these weaknesses. Khan et al's authentication scheme is vulnerable to insider attack and doesn't provide user anonymity to the server. Also, this scheme is still a weakness of wrong password input by mistake in spite of proposing the password change phase. In this paper, we will show that Khan et al's scheme is vulnerable to the stolen smart card attack and the strong server/user masquerade attack. The proposed authentication scheme propose the improved user anonymity, which can provide more secure privacy to user by improving these weaknesses.

Implementation of User Account Vulnerability Checking Function System using MS-SQL Database (MS-SQL 데이터베이스에서 특정 계정 취약점 판별 시스템 구현)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2482-2488
    • /
    • 2014
  • This paper proposes that a user account of the MS-SQL is checked whether expirated or not in C++ program environment. Vulnerability checking module decides security weakness for password change time or user configuration time. The proposed module prevents and protects a user account from a malicious user account. Recently, Information Assets becomes more important. If the loss of database information it would make large damage in our life. This paper develops user account checking module, which checks whether user password have not been changed for a long time or whether the user account expirated in the MS-SQL Database. By checking security vulnerability using this feature, a malicious user cannot access the Database.

Implementation of a Remote Authentication System Using Smartcards to Guarantee User Anonymity to Third Party (제 3자에게 사용자 익명성을 제공하는 스마트 카드 기반 원격 인증 시스템 구현)

  • Baek, Yi-Roo;Oh, Doo-Hwan;Gil, Kwang-Eun;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2750-2759
    • /
    • 2009
  • In this paper, we analyze vulnerabilities in a remote authentication protocol using smartcards which was proposed by Bindu et al. and propose an improved scheme. The proposed scheme can prevent from restricted replay attack and denial of service attack by replacing time stamp with random number. In addition, this protocol can guarantee user anonymity by transmitting encrypted user's ID using AES cipher algorithm. The computational load in our protocol is decreased by removing heavy exponentiation operations and user efficiency is enhanced due to addition of password change phase in which a user can freely change his password. Furthermore, we really implement the proposed authentication protocol using a STM smartcard and authentication server. Then we prove the correctness and effectiveness of the proposed remote authentication system.