• Title/Summary/Keyword: User Value

Search Result 1,755, Processing Time 0.026 seconds

A Multi-Agent MicroBlog Behavior based User Preference Profile Construction Approach

  • Kim, Jee-Hyun;Cho, Young-Im
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.1
    • /
    • pp.29-37
    • /
    • 2015
  • Nowadays, the user-centric application based web 2.0 has replaced the web 1.0. The users gain and provide information by interactive network applications. As a result, traditional approaches that only extract and analyze users' local document operating behavior and network browsing behavior to build the users' preference profile cannot fully reflect their interests. Therefore this paper proposed a preference analysis and indicating approach based on the users' communication information from MicroBlog, such as reading, forwarding and @ behavior, and using the improved PersonalRank method to analyze the importance of a user to other users in the network and based on the users' communication behavior to update the weight of the items in the user preference. Simulation result shows that our proposed method outperforms the ontology model, TREC model, and the category model in terms of 11SPR value.

Design of COS for smart card user authentication using signature (서명을 이용한 스마트카드 사용자 인증을 위한 COS 설계)

  • 송영상;신인철
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.4
    • /
    • pp.103-112
    • /
    • 2004
  • This paper suggests the way to realize smart card security system by using handwritten signature instead of a password which is traditionally used for user authentication. Because of the familiarity of signature we don't need to try to remember the password and signature is difficult to be used by guess or illegal forced situation. The feature data of handwritten signature is large, so we designed COS which is consist of special commands for processing user's handwritten signature data, user authentication, and basic commands based on ISO 7816-3. Also protocol among user, smart card terminal and DB server is designed. In registration process, the feature data of user signature is saved in both a DB server and a smart card. User authentication is processed by comparing the user signature and the saved feature data in a smart card and in a DB server. And the authentication result and hash value of signature data in DB server are transferred to smart card. During this process the authentication between DB server and user is finished. The proposed security system has more higher level of security in user authentication of smart card and it will Provide safer and more convenient security services.

User Visit Certification System using Inaudible Frequency

  • Chung, Myoungbeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.7
    • /
    • pp.57-64
    • /
    • 2021
  • In this paper, we propose and test the efficacy of an easy-to-use user location certification system for public places that relies on frequencies outside the audible range for humans. The inaudible frequencies come in signal frequency between 18-20 kHz and are generated by general audio speaker. After an individual's smart device detects the signal frequency, it sends the frequency value, user's personal ID, and user's location to a system server that certifies the user's visit location currently. The system server then saves a user visit record and categorizes it by individual. To show the usefulness of this proposed system, we developed a user visit certification application for smart devices linked to a system server. We then conducted a user visit certification experiment using the proposed system, with the result showing 99.6% accuracy. For a comparison, we then held a user visit certification experiment using a QR code, which confirmed that our proposed system performs better than QR code location certification. This proposed system can thus provide restaurants and other facilities reliable user contact tracing and electronic visitor access lists in the age of COVID-19.

Valuation of Use Value on Environmental Goods (환경자원의 이용가치 평가)

  • 박용치
    • Survey Research
    • /
    • v.2 no.2
    • /
    • pp.83-107
    • /
    • 2001
  • The contingent valuation method uses survey questions to elicit people's preferences for public goods by finding out what they would be willing to pay for specified improvement in them. The method is thus aimed at eliciting their willingness to pay in money amounts. It circumvents the absence of markets for public goods by presenting consumers with hypothetical markets in which they have the opportunities to buy the good In question. The hypothetical markets may be modeled after either a private goods market or a political market. Respondents are presented with material, often in the course of a personal interview conducted face to face. An on-site survey was conducted to 1107 randomly selected P-mountain users using a dichotomous choice questionnaire for the contingent valuation method. Seventeen different bid sets were chosen ranging from the lowest bid of 300won to the highest bid of 2, 100won to elicit a reasonable entrance fee in the hypothetical market. The probability of an individual user's willingness to pay for the suggested bid had been determined, and the expected value of willingness to pay was estimated using binary-1ogit model. The average public value of P-mountain per individual user was estimated to be 1,055.92won ~ 1,995.61won according to the binary-logit model. The economic value of this P-mountain which includes both use value and existence value can be determined by aggregating the average value giving total willingness to pay for the entire population, in this case 5.491 billion ~ 10.377 billion.

  • PDF

A Study on How to Enhance the Healthiness of UCC Value Chain (UCC 가치사슬의 건강성 제고방안에 관한 연구)

  • Kim, Yoo-Jung;Yoon, Jong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.241-253
    • /
    • 2008
  • UCC(User Created Content) has brought about much change in the way Internet users produce, publish, and share digital content. That means that Internet users are participating in the UCC service much mure voluntarily, and interacting each other mure proactively to meet their social-psychological needs such as self-expression, social presence and so on. Also, there has been the sharp increase in variety and volume of digital content on Internet. The reasons why are that UCC enables Internet users to produce and publish their own content with much low cost, and lowers the entrance barriers to the digital content market. Like this, UCC causes the unbundling of the value chain of digital content, resulting in the high uncertainty and complexity, and then leading to the low healthiness of UCC value chain in terms of productivity, robustness, niche creation, and safety. Thus, this paper is to identify the status and problems of UCC value chain and present the way how to enhance the healthiness of UCC value chain more comprehensively and systematically.

  • PDF

Continued Usage with Attachment on Mobile Devices Influencing Perceived Value and Perceived Enjoyment (지각된 가치와 지각된 즐거움과 모바일 디바이스의 지속적인 사용)

  • Kwon, Soon Jae
    • The Journal of Information Systems
    • /
    • v.24 no.1
    • /
    • pp.119-145
    • /
    • 2015
  • The concept of attachment between users and Information Systems; specifically on mobile devices was examined in this study. Furthermore, the moderating effect of users' past experience also was investigated. The empirical study was done involving 240 university students; to investigate the participants' perceived value, perceived enjoyment, attachment and also continuous usage of mobile devices. Additionally, participants' past experience was also enquired to examine its moderating effects. The results show that attachment is mediating both perceived value and perceived enjoyment with continuous usage. Meanwhile, past experience negatively moderates perceived enjoyment with attachment and also negatively moderates attachment with continuous usage.

A Study on the Intention of Early Users of Digital Finance baesd Mydata Service Application (디지털금융 기반 마이데이터 앱 초기 사용자들의 이용의도에 관한 연구)

  • Lee, Tae Won;Sung, Haeng Nam
    • The Journal of Information Systems
    • /
    • v.32 no.1
    • /
    • pp.1-21
    • /
    • 2023
  • Purpose The purpose of this study is to investigate the intention of early application users in consideration of the characteristics of digital finance-based MyData service users. It is expected that user characteristics will affect the intention to use MyData service, which has not yet been advanced, and accordingly, it will examine how the characteristics of the initial users of MyData service and the intention to use it are connected. Design/methodology/approach The model used in this study is a value-based adoption model (VAM), and a lot of research has been conducted on information technology and online user acceptance and continuous use intention of online users. VAM has been proven useful through empirical analysis in many studies. The value-based acceptance model is a method of analyzing the intention to use Benefits and Sacrifices as the main elements of perceived value. It can be said to be a model that can analyze the benefits of use and the sacrifices to be made. Findings According to the analysis results of this study, it was found that usefulness, enjoyment, and reliability, which are the benefits of MyData service apps, had a positive effect on perceived value, which is partially consistent with existing research results. However, it was found that complexity, which is the sacrifice of MyData service apps, negatively affects perceived value and security has no negative impact. The results of security are considered to be complementary to financial institutions because MyData service deals with financial data based on personal information, and the research hypothesis is rejected because users' demands are relatively low. Therefore, MyData service apps should do more to increase benefits (usefulness, enjoyment, and reliability) than to reduce sacrifice (complexity) to users.

A study on Classification of Insider threat using Markov Chain Model

  • Kim, Dong-Wook;Hong, Sung-Sam;Han, Myung-Mook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1887-1898
    • /
    • 2018
  • In this paper, a method to classify insider threat activity is introduced. The internal threats help detecting anomalous activity in the procedure performed by the user in an organization. When an anomalous value deviating from the overall behavior is displayed, we consider it as an inside threat for classification as an inside intimidator. To solve the situation, Markov Chain Model is employed. The Markov Chain Model shows the next state value through an arbitrary variable affected by the previous event. Similarly, the current activity can also be predicted based on the previous activity for the insider threat activity. A method was studied where the change items for such state are defined by a transition probability, and classified as detection of anomaly of the inside threat through values for a probability variable. We use the properties of the Markov chains to list the behavior of the user over time and to classify which state they belong to. Sequential data sets were generated according to the influence of n occurrences of Markov attribute and classified by machine learning algorithm. In the experiment, only 15% of the Cert: insider threat dataset was applied, and the result was 97% accuracy except for NaiveBayes. As a result of our research, it was confirmed that the Markov Chain Model can classify insider threats and can be fully utilized for user behavior classification.

A Study on Information Science : A Service Perspective (정보학의 서비스 영역에 대한 연구)

  • 구본영;박미영
    • Journal of Korean Library and Information Science Society
    • /
    • v.34 no.1
    • /
    • pp.351-378
    • /
    • 2003
  • This study has been examined in information service in related aspect of its user. Also this subject is researching of information itself attribution and relationship with end user And, in information facilities of library and information center it has been studied how to develope satisfaction service for user, along with fur causing both theory and practical application. For this object it has been also reviewed theoretically through out 5 fields as below; 1) information need and using 2) information storage and retrieval 3) information property and value 4) bibliometrics and citation analysis 5) administration and management.

  • PDF

Enhancing the Session Security of Zen Cart based on HMAC-SHA256

  • Lin, Lihui;Chen, Kaizhi;Zhong, Shangping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.466-483
    • /
    • 2017
  • Zen Cart is an open-source online store management system. It is used all over the world because of its stability and safety. Today, Zen Cart's session security mechanism is mainly used to verify user agents and check IP addresses. However, the security in verifying the user agent is lower and checking the IP address can affect the user's experience. This paper, which is based on the idea of session protection as proposed by Ben Adida, takes advantage of the HTML5's sessionStorage property to store the shared keys that are used in HMAC-SHA256 encryption. Moreover, the request path, current timestamp, and parameter are encrypted by using HMAC-SHA256 in the client. The client then submits the result to the web server as per request. Finally, the web server recalculates the HMAC-SHA256 value to validate the request by comparing it with the submitted value. In this way, the Zen Cart's open-source system is reinforced. Owing to the security and integrity of the HMAC-SHA256 algorithm, it can effectively protect the session security. Analysis and experimental results show that this mechanism can effectively protect the session security of Zen Cart without affecting the original performance.