• Title/Summary/Keyword: User Life

Search Result 1,407, Processing Time 0.029 seconds

A Test Case Prioritization Technique via Value-Based Approach (가치기반 접근법을 통한 테스트 케이스 우선순위 기법)

  • Park, Hyun-Cheol;Ryu, He-Yeon;Baik, Jong-Moon
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.5
    • /
    • pp.353-360
    • /
    • 2009
  • Software, once developed, has a long life and evolves through numerous additions and modifications because of the faults, the changes in user requirements, the changes in environments, and so forth. With the evolution of the software, assuring the quality of the software is getting more difficult because of numerous versions of the software. Meanwhile, regression testing has been used to support the software testing activities and assure acquiring appropriate quality through several versions of software. Regression testing, however, is too expensive because it requires lots of test cases executions and the number of test cases increases sharply as the software evolves. For this reason, several techniques are suggested to help conducting regression testing then test case prioritization technique is understood the most effective and efficient technique to support regression testing. In this paper, we propose an approach, Historical Value-Based Approach, which is based on the use of historical information to estimate the current cost and fault severity for cost-cognizant test case prioritization. As a result of the proposed approach, software testers who perform regression testing prioritize their test cases more effectively so that the test effectiveness of them can be improved in terms of APFDc.

Analysis the Types of Consumer Damages Incurred by Using a Digital Contents (디지털콘텐츠 소비자 피해유형 분석)

  • Nam, Su-Jung;Lee, Eun-Hee;Park, Sang-Mi
    • Korean Journal of Human Ecology
    • /
    • v.16 no.6
    • /
    • pp.1197-1209
    • /
    • 2007
  • The advance of digital contents industry shifts the focus of consumptions; from analogue to digital ones. It gives significant impact on individual life as well as overall society and culture, and it leads to the increased consumption of digital contents. Nevertheless, current digital contents industry fails to secure the sufficient consumer protection systems including relevant rules and laws which regulate the distribution, use, and other transaction activities of digital contents and the efforts, on the part of contents providers, to provide information to consumers and to protect them. Digital contents, by its nature, is different from the existing products so that its nature is likely to cause unique consumer problems totally different from the offline transactions and the electrical transactions of existing products. This study, therefore, aims to identify the possible problems which may be incurred by consumers in their use of digital contents, specify the types of consumer damages, and provide the underlying materials to improve the systems related to digital contents and take legally complementary measures for consumer protection. To identify the types of consumer damages, this study analyzed the results from consumer counselling cases, experts opinion survey, and FGI. For consumer damage cases, this study analyzed the consumer complaints received by open consumer counselling sites of the Korea Consumer Agency and Seoul Electronic Commerce Center. For experts opinion survey, it conducted questionnaire survey of the group of experts from digital contents manufacturers or providers, and those who treated consumer damages directly. For FGI analysis, it organized a panel of students and employees who had used digital contents to understand the types of consumer damages. The results of this study can be summed up as follows. Based on the results from consumer counselling cases, experts opinion survey, and FGI analysis, the consumer damages related to digital contents can be classified, in their nature, into economic or financial damages (25 cases), emotional or psychological ones (15 cases), time-related ones (7 cases), physical ones (4 cases), and privacy-related ones (i.e. leakage of personal data)(3 cases). More specifying the types of damages, damages can be subdivided into contract-, charge-, maintenance-, use-, individual-related ones and other ones. Among them, both contract- and charge-related damages appeared only in the economic or financial damages, whereas user-specific individual damages appeared only in physical and emotional or psychological ones. On the other hand, maintenance- and use-related damages and other ones were observed in both categories of economical or financial damages and time-related ones. Use- and privacy-related damages, in particular, caused emotional or psychological damages.

A Study on User's Acceptance of Blockchain-based Copyright Distribution Platforms and Its Usage (소비자의 블록체인 기반 저작권 유통 플랫폼 수용의도와 이용행위에 관한 연구)

  • Yoo, Young-Hwan;Park, Hyeon-Suk
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.3
    • /
    • pp.59-72
    • /
    • 2019
  • Purpose - Blockchain technology, which has the characteristics of credibility, security, integrity and decentralization, has brought innovation to internet platforms that mediate peer to peer transactions, as well as changes to the contents distribution services. Blockchain-based copyright distribution platforms can solve problems which have been articulated on prior internet social networks: increased market dominance of platform business because of centralization with no reward to creators who upload on platforms, and lack of fairness, such as unfair profit distribution between the copyright holder and businesses. With this background, the current research confirmed the factors that affect the intention of usage and behaviors, targeting potential users of blockchain-based copyright distribution platforms. Research design, data, and methodology - Centered around the UTAUT2 Model, the research model was designed with 'Perceived Security' added as Construct, and 'Age' and 'Knowledge Level' added as moderating variables. For data, 607 responses were collected by an online survey, and 601 responses were included in the final analysis. We analyzed the research model and sample by using SPSS 23.0 and AMOS 23.0 on the collected responses. Results - First, results of research on whether Constructs make positive effects on Intention of use is: social influence, facilitating conditions, habit, and perceived security had positive effects on intention of use, and performance expectancy, effort expectancy, hedonic motivation, and economic value did not. Second, results of the research on whether facilitating condition, habit, and intention of use made an impact on using behaviors, it was shown that only habit and intention of use made positive effects. Third, in two groups divided by age above or under 40, group effort expectancy, intention of use, habit, and intention of use had controlling effects, and facilitating condition, intention of use, perceived security, and intention of use had effects in both groups. Conclusions - The research shows that no matter how great a blockchain-based platform is, if advantages of blockchain are not proved in various industries and utilized in real life like the internet, blockchain-based distribution systems will develop slowly. Rather than a short-term inducement emphasizing technology, there is a need for a strategic approach that can foster the environment.

Complexity Metrics for Analysis Classes in the Unified Software Development Process (Unified Process의 분석 클래스에 대한 복잡도 척도)

  • 김유경;박재년
    • The KIPS Transactions:PartD
    • /
    • v.8D no.1
    • /
    • pp.71-80
    • /
    • 2001
  • Object-Oriented (OO) methodology to use the concept like encapsulation, inheritance, polymorphism, and message passing demands metrics that are different from structured methodology. There are many studies for OO software metrics such as program complexity or design metrics. But the metrics for the analysis class need to decrease the complexity in the analysis phase so that greatly reduce the effort and the cost of system development. In this paper, we propose new metrics to measure the complexity of analysis classes which draw out in the analysis phase based on Unified Process. By the collaboration complexity, is denoted by CC, we mean the maximum number of the collaborations can be achieved with each of the collaborator and detennine the potential complexity. And the interface complexity, is denoted by IC, shows the difficulty related to understand the interface of collaborators each other. We prove mathematically that the suggested metrics satisfy OO characteristics such as class size and inheritance. And we verify it theoretically for Weyuker' s nine properties. Moreover, we show the computation results for analysis classes of the system which automatically respond to questions of the it's user using the text mining technique. As we compared CC and IC to CBO and WMC, the complexity can be represented by CC and IC more than CBO and WMC. We expect to develop the cost-effective OO software by reviewing the complexity of analysis classes in the first stage of SDLC (Software Development Life Cycle).

  • PDF

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

Lightweight Authentication Scheme for Secure Data Transmission in Terrestrial CNPC Links (지상 CNPC 링크에서 안전한 데이터 전송을 위한 경량화된 인증기법)

  • Kim, Man Sik;Jun, Moon-Seog;Kang, Jung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.9
    • /
    • pp.429-436
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) that are piloted without human pilots can be commanded remotely via frequencies or perform pre-inputted missions. UAVs have been mainly used for military purposes, but due to the development of ICT technology, they are now widely used in the private sector. Teal Group's 2014 World UAV Forecast predicts that the UAV market will grow by 10% annually over the next decade, reaching $ 12.5 billion by 2023. However, because UAVs are primarily remotely controlled, if a malicious user accesses a remotely controlled UAV, it could seriously infringe privacy and cause financial loss or even loss of life. To solve this problem, a secure channel must be established through mutual authentication between the UAV and the control center. However, existing security techniques require a lot of computing resources and power, and because communication distances, infrastructure, and data flow are different from UAV networks, it is unsuitable for application in UAV environments. To resolve this problem, the study presents a lightweight UAV authentication method based on Physical Unclonable Functions (PUFs) that requires less computing resources in the ground Control and Non-Payload Communication (CNPC) environment, where recently, technology standardization is actively under progress.

A Proposal for User Experience Design for Domestic Bicycle Rider whom going Long Distance Trip -Focusing on App - (국내 장거리 자전거 여행자를 위한 사용자 경험 디자인 제안 -자전거 행복나눔 애플리케이션을 중심으로-)

  • Yun, Byung-Hun;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.16 no.4
    • /
    • pp.299-306
    • /
    • 2018
  • This study is to measure traveling experience of bike riders whom going long distance trip. Bike paths and bike riding are crucial element for modern people's life style. At the same time, a bicycle trail is being developed by the National Bicycled-Oriented Chair Plan, which was established in 2009 by the National Bike Policy Master Plan. 13 million bike riders in Korea is keep on trying the long distance bike trip and its number is increasing every year. Accordingly, the Ministry of Public Administration and Security decides to promote the convenience of riders by developing bicycle app for long distance rider. The study attempted to assess usability of this app with 39 bike applications whom currently using the bike application. Afterwards, the researchers tests 11 hypotheses through in-depth interviews of six activated members. In sum, Bicycle travelers should be provided with bike trail guidance based on theme section skill, provided in-time speed distance related information, communicated with other bike riders, given tips for bike supplies and maintenance, and provided English language service. The study hopes to help find a customized service for bike travelers.

Big Data based Tourist Attractions Recommendation - Focus on Korean Tourism Organization Linked Open Data - (빅데이터 기반 관광지 추천 시스템 구현 - 한국관광공사 LOD를 중심으로 -)

  • Ahn, Jinhyun;Kim, Eung-Hee;Kim, Hong-Gee
    • Management & Information Systems Review
    • /
    • v.36 no.4
    • /
    • pp.129-148
    • /
    • 2017
  • Conventional exhibition management information systems recommend tourist attractions that are close to the place in which an exhibition is held. Some recommended attractions by the location-based recommendation could be meaningless when nothing is related to the exhibition's topic. Our goal is to recommend attractions that are related to the content presented in the exhibition, which can be coined as content-based recommendation. Even though human exhibition curators can do this, the quality is limited to their manual task and knowledge. We propose an automatic way of discovering attractions relevant to an exhibition of interests. Language resources are incorporated to discover attractions that are more meaningful. Because a typical single machine is unable to deal with such large-scale language resources efficiently, we implemented the algorithm on top of Apache Spark, which is a well-known distributed computing framework. As a user interface prototype, a web-based system is implemented that provides users with a list of relevant attractions when users are browsing exhibition information, available at http://bike.snu.ac.kr/WARP. We carried out a case study based on Korean Tourism Organization Linked Open Data with Korean Wikipedia as a language resource. Experimental results are demonstrated to show the efficiency and effectiveness of the proposed system. The effectiveness was evaluated against well-known exhibitions. It is expected that the proposed approach will contribute to the development of both exhibition and tourist industries by motivating exhibition visitors to become active tourists.

  • PDF

FDM Full Color 3D Printer GUI Design Development of Checklist for Usability (FDM 풀 컬러 3D프린터 GUI디자인 사용성을 위한 체크리스트 개발)

  • Park, Ji-Hoon;Jang, Jung-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.123-134
    • /
    • 2020
  • With the recent development of 3D printers, there is a growing need to make them similar to real products. As a result, FDM full-color 3D printers have been developed and actively distributed, but GUI design has fallen short of that, causing confusion among users. Accordingly, this study conducted a literature survey, and through a case study, the current status of FDM full-color 3D printers was identified and the components of GUI design were analyzed based on prior research. The draft checklist was drawn up according to the components of the derived GUI design, and 24 items were deleted through the three Delphi surveys and the validity of the remaining 26 items was verified. As a result, the layout should consist of intuitive screen configuration and menus with high frequency of use, and the text should be intuitive and clearly communicated. In addition, the icon should be placed in a visible position and used in real life to image it. Finally, we could see that the color should be used to give feedback to the user using the highlight color and not overlap the output.

A Study on the Design Value Analysis Methodology for Bridge Structure Using Reliability Analysis (신뢰성 해석을 이용한 교량구조물의 설계VA기법 연구)

  • Kim, Seong-Il;Lee, Kwang-Mo;Choi, Suk-Won;Jung, Jun-Hwa;Kim, Seong-Il
    • Korean Journal of Construction Engineering and Management
    • /
    • v.10 no.1
    • /
    • pp.114-125
    • /
    • 2009
  • In this study, a design value analysis technique that considered stochastic LCC and stochastic performance evaluation was proposed, and by introducing the concept of reliability analysis, a decision making that secured reliability was supported. The results of this study, which was carried out according to the above objectives and methods, are summarized as follows: 1) The design value analysis procedures and value state function, improved in order to carry out a reliable analysis when evaluating alternate proposals that were extracted after the function definition was complete, were formalized, and in order to secure consistency and efficiency for value evaluation procedures, an evaluation index scheme was proposed; 2) Database collection and analysis were done for a bridge's LCC analysis. As for the collection scope of data, literature of previous research done on a bridge's LCC analysis was used as the basis for analysis, and for securing reliability regarding analysis results and dealing with uncertainty of collected data, the MCS technique was applied; 3) Weights and evaluation ranks for performance evaluation of each of the alternate proposals, as well as LCC analysis model, analysis period, discount rate, user expense, safety inspection and safety diagnosis expense conditions for LCC analysis were proposed. Lastly, a feasibility study was done and conclusion was made about "OO grand bridge and connecting road construction work execution design" project centered on value analysis execution case.