• 제목/요약/키워드: User Problem Behaviors

검색결과 43건 처리시간 0.023초

실업계 고등학생의 인터넷 중독 수준과 가족체계유형에 따른 인터넷 사용동기 및 문제행동 (Internet Use Motivations and Problem Behaviors of Vocational High School Students according to Internet Addiction and Family System Type)

  • 신수정;장윤옥
    • 가정과삶의질연구
    • /
    • 제25권5호
    • /
    • pp.31-46
    • /
    • 2007
  • The purpose of this study was to determine the differences in internet use motivations and problem behaviors among vocational high school students according to internet addiction and family system type. Five hundred vocational high school students from Daegu took part in the survey. The questionnaire survey consisted of an internet addiction self-assessment scale, a family system type scale, an internet use motivation scale, and a problem behavior scale. The data was analysed using MANOVA and Cronbach a, and the $Scheff\acute{e}$ test was used for post-hoc analysis. The major findings of this study were as follows: First, the study found significant differences in adolescent internet use motivation according to internet addiction. Adolescents in the high dangerous user group showed higher communicative, experiential, and addictive motivations than adolescents in potentially dangerous and normal user groups. Also, there were no significant differences in informative motivation according to internet addiction. Regardless of internet addiction, adolescents tend to use the internet to search for information and to solve problems. Second, there were significant differences in adolescents' problem behaviors according to internet addiction. More specifically, adolescents who were in the high dangerous user group displayed more problem behaviors toward their body, family, school, and society than adolescents in the potentially dangerous and the normal user groups. Third, an adolescent's family system type significantly influenced his/her internet use motivation. Adolescents from an extreme family showed higher communicative and addictive motivations than adolescents from middle and balanced families. Fourth, there were significant differences in the problem behaviors of adolescents according to family system types. Adolescents from an extreme family showed more problem behaviors toward their body, family, school, and society than adolescents from middle and balanced families.

Product Adoption Maximization Leveraging Social Influence and User Interest Mining

  • Ji, Ping;Huang, Hui;Liu, Xueliang;Hu, Xueyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권6호
    • /
    • pp.2069-2085
    • /
    • 2021
  • A Social Networking Service (SNS) platform provides digital footprints to discover users' interests and track the social diffusion of product adoptions. How to identify a small set of seed users in a SNS who is potential to adopt a new promoting product with high probability, is a key question in social networks. Existing works approached this as a social influence maximization problem. However, these approaches relied heavily on text information for topic modeling and neglected the impact of seed users' relation in the model. To this end, in this paper, we first develop a general product adoption function integrating both users' interest and social influence, where the user interest model relies on historical user behavior and the seed users' evaluations without any text information. Accordingly, we formulate a product adoption maximization problem and prove NP-hardness of this problem. We then design an efficient algorithm to solve this problem. We further devise a method to automatically learn the parameter in the proposed adoption function from users' past behaviors. Finally, experimental results show the soundness of our proposed adoption decision function and the effectiveness of the proposed seed selection method for product adoption maximization.

국외 공공도서관의 이용자 문제행동에 대한 대처방안분석 (A Study on the User Problem Behavior in Overseas Public Libraries)

  • 이은주; 윤유라
    • 문화기술의 융합
    • /
    • 제9권6호
    • /
    • pp.187-192
    • /
    • 2023
  • 도서관 문제이용자는 도서관에서 적절하지 않은 행동을 통해 다른 사람을 괴롭히거나 소동을 일으키는 사람을 지칭한다. 이용자들의 지속적인 문제행동은 도서관 사서의 업무생산성을 저하시킴과 동시에 다른 이용자들에게 불편을 유발하고 이는 공공도서관의 자유로운 이용을 저해할 수 있다. 국내에서는 이용자 응대 업무 매뉴얼을 개발하여 사서들이 문제행동에 대해 현명하게 대응할 수 있도록 안내하고 있으나, 주로 문제이용자들과의 커뮤니케이션 방법에 대해 안내하는 정도의 내용이 대부분으로, 그들에 대한 후속조치를 명문화하고 규정화하기 위한 대응책 마련이 부족한 현실이다. 이에 본 연구에서는 이용자 문제행동에 대한 대처방안을 다룬 규정 수립을 위해 국외의 문제이용자에 대해 규정과 이를 둘러싼 법정공방을 사례로 살펴보고 향후 국내에서 적용해 볼 수 있는 점이 무엇인지 살펴보고자 하였다.

계층적 행위 스크립트 표현을 통한 아바타-객체 행위 제어를 위한 인터페이스 기법 (An Interface Technique for Avatar-Object Behavior Control using Layered Behavior Script Representation)

  • 최승혁;김재경;임순범;최윤철
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제33권9호
    • /
    • pp.751-775
    • /
    • 2006
  • 본 논문에서는 아바타의 행위(Avatar Behavior)를 상위 레벨 명령어(High-Level Behavior)들로 이루어진 스크립트로 제어하는 기법을 제안한다. 아바타 행위를 추상화 정도에 따라 구분하고 이를 표준화된 계층적 스크립트(Layered Script)로 정의 함으로써 사용자는 스크립트를 재사용할 수 있고 행위의 추상화 조절이 가능하다. 또한 가상 환경이 복잡해짐에 따라 아바타 행위도 다양하게 늘어날 뿐 아니라 아바타-객체 상호작용 처리 역시 복잡해지고 있다. 이러한 문제점을 해결하기 위해 아바타와 객체간의 상호작용을 위한 객체 모델을 제안하여 아바타와 객체간 벌어지는 행위들을 객체 안에 분산시켜 표현함으로써 객체지향 방식으로 아바타 행위를 유연하게 제어할 수 있도록 설계하였다. 이를 위해 제안 객체 모델에서는 객체의 상태에 따라 사용 가능한 행위가 결정되는 컨텍스트 메뉴(context menu) 인터페이스와 동작 생성 모델을 정의하였다. 또한 사용자는 기존의 2D 혹은 텍스트기반 스크립트 작성기법을 벗어나 제안된 3D 인터페이스 기법을 통하여 실시간으로 아바타의 행위 스크립트를 작성 및 재생 할 수 있다. 본 연구에서는 제안 기법의 활용을 위해 프레젠테이션 도메인 환경의 시스템을 구축하고 아바타-객체 행위제어 및 스크립트 생성 기법을 적용하였다. 본 논문에서는 아바타의 행위(Avatar Behavior)를 일종의 상위 레벨 명령어(Hi8h-Level TaskBehavior)들로 이루어진 스크립트로 제어하는 기법을 제시한다제안한다. 아바타 행위를 추상화 정도에 따라 구분하고 이를 표준화된 계층적 스크립트(Multi-LeveiLayered Script)로 정의 함으로써 사용자는 쉽게 스크립트를 재사용할 수 있고 행위의 추상화 정도도 쉽게 조절이 가능하다. 또한 또한 아바타와 객체간의 상호작용을 위한 객체 모델을 제시한다. 가상 환경이 복잡해짐에 따라 아바타 행위도 다양하게 늘어날 뿐 아니라 아바타-객체 상호작용 처리 역시 복잡해지고 있다. 이러한 문제점을 해결하기 위해 아바타와 객체간의 상호작용을 위한 객체 모델을 제안하여 아바타와 객체간 벌어지는 모든 행위들을 객체 안에 분산시켜 저장표현함으로써 객체지향 방식으로 아바타 행위를 유연하게 제어객체의 수와 무관하게 상호작용을 처리할 수 있도록 설계하였다. 이를 위해 또한 복잡해진 제안 객체 모델에서는 객체의 상태에 따라 사용 가능한 행위가 결정되는 가상 환경을 위해 새로운 인터페이스로 컨텍스트 메뉴(context menu) 인터페이스와 동작 생성 모델을 제시한다. 정의하였다. 객체 모델에서 객체의 상태 정보와 행위 정보를 분석해 아바타가 할 수 있는 행위를 컨텍스트 메뉴로 제공하기 때문에 사용자는 가상 환경의 상태에 상관 없이 직관적으로 명령을 줄 수 있다. 또한 사용자는 기존의 2D 혹은 텍스트기반 스크립트 작성기법을 벗어나 사용자는 제안된 3D 인터페이스 기법을 통하여 실시간으로 아바타의 행위 스크립트를 작성 및 재생 할 수 있다. 본 논문에서 제시한 시스템은 기존의 아바타 중심적인 제어를 객체에 분산함으로써 효율적이고 직관적인 명령을 내릴 수 있고 또한 손쉬운 시나리오 생성을 가능하게 하였다. 본 연구에서는 제안 기법의 활용을 위해 프리젠테이션 도메인 환경의 시스템을 구축하고 아바타-객체 행위제어 및 스크립트 생성 기법을 적용하였다.

A Robust Bayesian Probabilistic Matrix Factorization Model for Collaborative Filtering Recommender Systems Based on User Anomaly Rating Behavior Detection

  • Yu, Hongtao;Sun, Lijun;Zhang, Fuzhi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권9호
    • /
    • pp.4684-4705
    • /
    • 2019
  • Collaborative filtering recommender systems are vulnerable to shilling attacks in which malicious users may inject biased profiles to promote or demote a particular item being recommended. To tackle this problem, many robust collaborative recommendation methods have been presented. Unfortunately, the robustness of most methods is improved at the expense of prediction accuracy. In this paper, we construct a robust Bayesian probabilistic matrix factorization model for collaborative filtering recommender systems by incorporating the detection of user anomaly rating behaviors. We first detect the anomaly rating behaviors of users by the modified K-means algorithm and target item identification method to generate an indicator matrix of attack users. Then we incorporate the indicator matrix of attack users to construct a robust Bayesian probabilistic matrix factorization model and based on which a robust collaborative recommendation algorithm is devised. The experimental results on the MovieLens and Netflix datasets show that our model can significantly improve the robustness and recommendation accuracy compared with three baseline methods.

비정상적인 컴퓨터 행위 방지를 위한 실시간 침입 탐지 병렬 시스템에 관한 연구 (Real-time Intrusion-Detection Parallel System for the Prevention of Anomalous Computer Behaviours)

  • 유은진;전문석
    • 정보보호학회지
    • /
    • 제5권2호
    • /
    • pp.32-48
    • /
    • 1995
  • Our paper describes an Intrusion Detection Parallel System(IDPS) which detects an anomaly activity corresponding to the actions that interaction between near detection events. IDES uses parallel inductive approaches regarding the problem of real-time anomaly behavior detection on rule-based system. This approach uses sequential rule that describes user's behavior and characteristics dependent on time. and that audits user's activities by using rule base as data base to store user's behavior pattern. When user's activity deviates significantly from expected behavior described in rule base. anomaly behaviors are recorded. Observed behavior is flagged as a potential intrusion if it deviates significantly from the expected behavior or if it triggers a rule in the parallel inductive system.

  • PDF

교통망에서 다차종 통행을 고려하는 통행배정모형 수립 (A Traffic Assignment Model in Multiclass Transportation Networks)

  • 박구현
    • 한국경영과학회지
    • /
    • 제32권3호
    • /
    • pp.63-80
    • /
    • 2007
  • This study is a generalization of 'stable dynamics' recently suggested by Nesterov and de Palma[29]. Stable dynamics is a new model which describes and provides a stable state of congestion in urban transportation networks. In comparison with user equilibrium model that is common in analyzing transportation networks, stable dynamics requires few parameters and is coincident with intuitions and observations on the congestion. Therefore it is expected to be an useful analysis tool for transportation planners. An equilibrium in stable dynamics needs only maximum flow in each arc and Wardrop[33] Principle. In this study, we generalize the stable dynamics into the model with multiple traffic classes. We classify the traffic into the types of vehicle such as cars, buses and trucks. Driving behaviors classified by age, sex and income-level can also be classes. We develop an equilibrium with multiple traffic classes. We can find the equilibrium by solving the well-known network problem, multicommodity minimum cost network flow problem.

아파트 단지내 지하주차장의 이용행태 분석에 관한 연구 (A Study on the Analysis of Users' Behaviors on the Underground Parking Space in an Apartment Complex)

  • 이상구;윤충열
    • 한국주거학회논문집
    • /
    • 제14권6호
    • /
    • pp.165-172
    • /
    • 2003
  • With the rate of spread of motors rapidly increased, but parking difficulties in an apartment complex was aggravated due to an insufficient parking lot. Visual interference on residential environment, various kinds of pollution and noise, decrease of open space in an apartment complex are also causes of parking difficulties. Therefore, this study is to suggest a theory of desirable direction for planning of the parking space by studying psychological characteristics of users' behaviors by the type of the circulation of motors and pedestrians. Consideration on the present situation, real conditions of underground parking space and the consciousness and parking habit of residents, the most important problem is required in this study.

이용자 장서이용행태 분석을 통한 공공도서관의 장서개발에 관한 연구 (A Study of Collection Development by Analyzing Users' Collection-Use Behaviors in Public Libraries)

  • 이진경;이지연
    • 한국비블리아학회지
    • /
    • 제22권3호
    • /
    • pp.151-171
    • /
    • 2011
  • 공공도서관은 방문하는 이용자들의 배경이 다양하고 도서관을 찾는 목적 또한 다양하기 때문에 모든 이용자의 요구를 충분히 만족시키기에 어려움을 겪고 있다. 이를 극복하기 위한 노력으로 공공도서관 자료의 만족 수준을 높일 수 있는 장서개발 연구가 필요하다. 따라서 본 연구는 공공도서관의 장서개발을 위해 서울특별시 소재 구립 공공도서관 10개관 이용자들을 대상으로 설문조사를 실시하여 이용자의 장서이용행태를 파악하고, 이를 바탕으로 서울시 구립 공공도서관을 위한 장서개발의 방향을 제시하였다.

심리적 계약 위반이 OS이용자의 배신 행동에 미치는 영향: 윈도우 XP 기술적 지원서비스 중단 사례 (The Effects of Psychological Contract Violation on OS User's Betrayal Behaviors: Window XP Technical Support Ending Case)

  • 이은곤
    • Asia pacific journal of information systems
    • /
    • 제24권3호
    • /
    • pp.325-344
    • /
    • 2014
  • Technical support of Window XP ended in March, 8, 2014, and it makes OS(Operating System) users fall in a state of confusion. Sudden decision making of OS upgrade and replacement is not a simple problem. Firms need to change the long term capacity plan in enterprise IS management, but they are pressed for time and cost to complete it. Individuals can not help selecting the second best plan, because the following OSs of Window XP are below expectations in performances, new PC sales as the opportunities of OS upgrade decrease, and the potential risk of OS technical support ending had not announced to OS users at the point of purchase. Microsoft as the OS vendors had not presented precaution or remedy for this confusion. Rather, Microsoft announced that the technical support of the other following OSs of Wndow XP such as Window 7 would ended in two years. This conflict between OS vendor and OS users could not happen in one time, but could recur in recent future. Although studies on the ways of OS user protection policy would be needed to escape from this conflict, few prior studies had conducted this issue. This study had challenge to cautiously investigate in such OS user's reactions as the confirmation with OS user's expectation in the point of purchase, three types of justice perception on the treatment of OS vendor, psychological contract violation, satisfaction and the other betrayal behavioral intention in the case of Window XP technical support ending. By adopting the justice perception on this research, and by empirically validating the impact on OS user's reactions, I could suggest the direction of establishing OS user protection policy of OS vendor. Based on the expectation-confirmation theory, the theory of justice, literatures about psychological contract violation, and studies about consumer betrayal behaviors in the perspective of Herzberg(1968)'s dual factor theory, I developed the research model and hypothesis. Expectation-confirmation theory explain that consumers had expectation on the performance of product in the point of sale, and they could satisfied with their purchase behaviors, when the expectation could have confirmed in the point of consumption. The theory of justice in social exchange argues that treatee could be willing to accept the treatment by treater when the three types of justice as distributive, procedural, and interactional justice could be established in treatment. Literatures about psychological contract violation in human behaviors explains that contracter in a side could have the implied contract (also called 'psychological contract') which the contracter in the other side would sincerely execute the contract, and that they are willing to do vengeance behaviors when their contract had unfairly been broken. When the psychological contract of consumers had been broken, consumers feel distrust with the vendors and are willing to decrease such beneficial attitude and behavior as satisfaction, loyalty and repurchase intention. At the same time, consumers feel betrayal and are willing to increase such retributive attitude and behavior as negative word-of-mouth, complain to the vendors, complain to the third parties for consumer protection. We conducted a scenario survey in order to validate our research model at March, 2013, when is the point of news released firstly and when is the point of one year before the acture Window XP technical support ending. We collected the valid data from 238 voluntary participants who are the OS users but had not yet exposed the news of Window OSs technical support ending schedule. The subject had been allocated into two groups and one of two groups had been exposed this news. The data had been analyzed by the MANOVA and PLS. MANOVA results indicate that the OSs technical support ending could significantly decrease all three types of justice perception. PLS results indicated that it could significantly increase psychological contract violation and that this increased psychological contract violation could significantly reduce the trust and increase the perceived betrayal. Then, it could significantly reduce satisfaction, loyalty, and repurchase intention, and it also could significantly increase negative word-of-month intention, complain to the vendor intention, and complain to the third party intention. All hypothesis had been significantly approved. Consequently, OS users feel that the OSs technical support ending is not natural value added service ending, but the violation of the core OS purchase contract, that it could be the posteriori prohibition of OS user's OS usage right, and that it could induce the psychological contract violation of OS users. This study would contributions to introduce the psychological contract violation of the OS users from the OSs technical support ending in IS field, to introduce three types of justice as the antecedents of psychological contract violation, and to empirically validate the impact of psychological contract violation both on the beneficial and retributive behavioral intentions of OS users. For practice, the results of this study could contribute to make more comprehensive OS user protection policy and consumer relationship management practices of OS vendor.