• Title/Summary/Keyword: User association

Search Result 2,829, Processing Time 0.024 seconds

A Password-Authenticated Key Distribution Method Using Threshold PKC (Threshold PKC를 이용한 패스워드 기반 키분배 방식)

  • 이영숙;이영교;원동호
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.3
    • /
    • pp.53-60
    • /
    • 2004
  • In this paper we present user authentication and key distribution using threshold PKC(Public Key Cryptosystem), which is secure against the dictionary attack. The n servers hold a t-out-of-n sharing of the dealer's secret key. When the server authenticate a user, at least f of them cooperate they can reconstruct password verifier.

  • PDF

The Effects of Contents and Parody Traits on UCC User Attitude and e-Worth of Mouth (콘텐츠와 패러디 특성이 UCC 사용자 태도 및 온라인 구전의도에 미치는 영향)

  • Hwang, In-Ho;Kim, Tea-Ha;Kim, Jin-Soo
    • The Journal of Information Systems
    • /
    • v.21 no.3
    • /
    • pp.1-22
    • /
    • 2012
  • This study aims to investigate the effects of UCC parody content trait on user attitude and e-word of mouth. The conventional methods had two identified factors: UCC content factors - trust, usefulness, and information, and parody content factors - humor, satire, and mockery. It also analyzes the impacts gap in UCC attitude between a high-involvement user and a low-involvement user in UCC contents. In this study, our findings are broadly summarized as follows: first, both trust and information, of UCC content factors, showed a positive impact on UCC attitude; second, both humor and satire, of parody content factors, showed a positive impact on UCC attitude; third, UCC attitude showed a positive impact on e-word of mouth, and both humor and satire were highly correlated to UCC attitude in UCC involvement user groups. In conclusion, this study is expected to give useful suggestions on selecting variables for further studies on UCC parody contents.

A Consecutive Motion and Situation Recognition Mechanism to Detect a Vulnerable Condition Based on Android Smartphone

  • Choi, Hoan-Suk;Lee, Gyu Myoung;Rhee, Woo-Seop
    • International Journal of Contents
    • /
    • v.16 no.3
    • /
    • pp.1-17
    • /
    • 2020
  • Human motion recognition is essential for user-centric services such as surveillance-based security, elderly condition monitoring, exercise tracking, daily calories expend analysis, etc. It is typically based on the movement data analysis such as the acceleration and angular velocity of a target user. The existing motion recognition studies are only intended to measure the basic information (e.g., user's stride, number of steps, speed) or to recognize single motion (e.g., sitting, running, walking). Thus, a new mechanism is required to identify the transition of single motions for assessing a user's consecutive motion more accurately as well as recognizing the user's body and surrounding situations arising from the motion. Thus, in this paper, we collect the human movement data through Android smartphones in real time for five targeting single motions and propose a mechanism to recognize a consecutive motion including transitions among various motions and an occurred situation, with the state transition model to check if a vulnerable (life-threatening) condition, especially for the elderly, has occurred or not. Through implementation and experiments, we demonstrate that the proposed mechanism recognizes a consecutive motion and a user's situation accurately and quickly. As a result of the recognition experiment about mix sequence likened to daily motion, the proposed adoptive weighting method showed 4% (Holding time=15 sec), 88% (30 sec), 6.5% (60 sec) improvements compared to static method.

A Study on Factors Influencing User's Security Behavioral Intention for Choosing Password (패스워드 선택을 위한 사용자의 보안행위의도에 영향을 미치는 요인)

  • Kim, Jong-Ki;Kang, Da-Yeon;Jeon, Jin-Hwan
    • The Journal of Information Systems
    • /
    • v.17 no.1
    • /
    • pp.23-43
    • /
    • 2008
  • Nowadays, openness and accessibility of information systems increase security threats from inside and outside of organization. Appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. This study emphasizes on choosing passwords from perspective of information security and investigated user's security awareness affecting behavioral intention. The research model proposed in this study includes user's security belief which is influenced by risk awareness factors such as information assets, threats and vulnerability elements. The risk awareness factors ale derived from risk analysis methodologies for information security. User's risk awareness is a factor influencing the security belief, attitude toward security behavior, and security behavioral intention. According to the result of this study, while vulnerability is not related to the risk awareness, information assets and threats are related to the user's risk awareness. There is a significant relationship between risk awareness and security belief. Also, user's security behavioral intention is significantly affected by security attitude.

The Effects of Information Security Policies, Security Controls and User's Characteristics on Anti-Virus Security Effectiveness (정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로)

  • Kim Jong-Ki;Jeon Jin-Hwan;Lim Ho-Seob
    • The Journal of Information Systems
    • /
    • v.15 no.1
    • /
    • pp.145-168
    • /
    • 2006
  • Current computer viruses are one of the most serious problems in information age due to their potential demage and impact on use of information systems. To make the problem worse, virus development technology has been advanced rapidly, and use of network systems has expanded widely. Therefore computer viruses are much more complex and use of anti-virus software(AV S/W) is not enough to prrevent virus incidents. It implies that computer viruses as well as other information security matters are not solely a technical problem but also a managerial one. This study emphasized on computer virus controls from managerial perspective of information security and investigated factors influencing the effectiveness of computer virus controls. Organization's comprehensive security policies provide guidelines on how organization or individual can protect themselves from computer viruses. Especially, user's education has positive impact on user's security related characteristics. Based on the analysis of research model using structural equation modeling technique, security policies were influencing security controls and improving user's computer viruses related awareness. Also security controls had positive impact on security effectiveness. However, no significant relationship was found between user's security related characteristics and security effectiveness.

  • PDF

A Study on the Intention of Continuous Usage of O2O Service: Focusing on the Moderating Effect of User Innovation (O2O 서비스의 지속이용의도에 관한 연구 : 이용자 혁신성의 조절효과를 중심으로)

  • Lee, Og;Lee, MoonBong
    • The Journal of Information Systems
    • /
    • v.29 no.2
    • /
    • pp.51-69
    • /
    • 2020
  • Purpose Today, the increasing of internet use and the expansion of internet range provide us with many opportunities. Therefore, this study examine relation of perceived ease of use, perceived playfulness, perceived risk, perceived usefulness based on previous studies. And we examine the effect of O2O service satisfaction on continuous use intention. Also, we studied the relationship between perceived ease of use, perceived playfulness, perceived risk, perceived usefulness according to user innovation. Design/Methodology A Structural Equation Model(SEM) method was used to test the theoretical framework based on a sample of 451 respondents who have experienced the O2O service. Factor analysis and confirmation factor analysis was conducted to check the reliability, convergency validity and discriminant validity. To test moderating effect of the user innovation, multi group analysis was conducted. Findings First, perceived ease of use, perceived playfulness, perceived risk have significant effects on perceived usefulness. Second, perceived usefulness of O2O service have a positive effect on satisfaction. Third, satisfaction of O2O service have a positive effect on continuous use intention. The relationship that perceived ease of use, perceived playfulness, perceived risk affect perceived usefulness is differ depending on user innovation. Based on these findings, this study suggested to marketing practitioners the need for different approach by a user innovation.

Design and Implement of Authentication System for Secure User Management for Secure on Medical ICT Convergence Environment (의료 ICT융합 환경에서 안전한 사용자 관리를 위한 인증시스템 설계 및 구현: 중소형 의료기관을 중심으로)

  • Kim, Yanghoon;Choi, Yean Jung
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.29-36
    • /
    • 2019
  • The convergence of traditional industry and ICT is a combination of security threats and vulnerabilities in ICT and specific industry-specific problems of existing industries, and new security threats and vulnerabilities are emerging. In particular, in the medical ICT convergence industry, various problems regarding user authentication are derived from the medical information system, which is being used for abuse and security weaknesses. According, this study designed and implemented a user authentication system for secure user management in medical ICT convergence environment. Specifically, we design and implement measures to solve the abuse and security weaknesses of ID sharing and to solve the inconvenience of individual ID / PW authentication by performing user authentication using personalized devices based on medical information systems.

Influence on the Use Intention of User's Traits in China Market

  • Lee, Jong-Ho;Wu, Runze;Fan, Linlin
    • Asian Journal of Business Environment
    • /
    • v.7 no.2
    • /
    • pp.21-29
    • /
    • 2017
  • Purpose - Because of the development of smartphone and communication technology, Smart TV programs are filled with various contents and applications. This study included additional individual variables like innovativeness and self-efficacy, and characteristics of smart TV are both user-interface and function as exogenous factors based on TAM model. So, this study focuses on identifying the influencing factors of continuous use intention of smart TV traits and user ones and analyzing how they make influences on them in China market. Research design, data, and methodology - Totally 182 samples were adopted as appropriate ones for analysis in this study. They were collected from 20 February 2016 to 10 March 2016. Results - The results are as follows. First, function has positive influence on perceived usefulness. Second, innovation and user-interface make affirmative influences on perceived easiness. Third, perceived easiness has affirmative influence on perceived usefulness. Fourth, the perceived easiness and perceived usefulness make positive ones on continuous use intention. Fifth, perceived ease of use affects significantly on perceived usefulness. Conclusions - According to the findings, they (smart TV traits and user traits), influencing on continuous use intention, are possible to give significant implications on persistent development in China smart TV market.

A Study on the Factors Affecting Game Flow and Satisfaction in Mobile Game (모바일 게임에 대한 몰입과 만족도에 미치는 영향요인 연구)

  • Lee, Jin Hyung;Kim, Chul Soo
    • The Journal of Information Systems
    • /
    • v.28 no.1
    • /
    • pp.183-206
    • /
    • 2019
  • Purpose Research purpose is extraction of the factors affecting game flow and satisfaction in mobile game. Design/methodology/approach In mobile game, the factors affecting game flow were classified into three parts: mobile game platform characteristics, user cognition characteristics, and user individual characteristics through previous studies for existing online game and mobile game. In the research we extracted the factors as follows: the connectivity, usability, network speed, pleasure, service quality, relatedness, proficiency, self-fulfillment, early adopter tendency, and competitive spirit. Using the factors, we established research model and tested hypotheses empirically. This survey was conducted five months targeting from teenagers to fifties with mobile game experience. The questionnaire items were reconstructed according to the questionnaires of the present study or those newly developed by the game experts and total 56 items in the literature of Internet game, smartphone game, and mobile game based on the existing literature study respectively. Findings According to the analysis result, this study showed that ease of use, enjoyment, self - fulfillment and competitive spirit had a significant influence on user flow and also that service quality, proficiency and competitive spirit had a significant influence on user satisfaction in mobile games.

Development of User-dependent Mid-point Navigation System (사용자 중심의 중간지점 탐색 시스템의 설계 및 구현)

  • Ahn, Jonghee;Kang, Inhyeok;Seo, Seyeong;Kim, Taewoo;Heo, Yusung;Ahn, Yonghak
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.73-81
    • /
    • 2019
  • In this paper, we propose a user-dependent mid-point navigation system using a time weighted mid-point navigation algorithm and a user preference based mid-point neighborhood recommendation system. The proposed system consists of a mid-point navigation module for calculating an mid-point by applying a time weight of each user based on a departure point between users, and a search module for providing a search for a route to the calculated mid-point. In addition, based on the mid-point search result, it is possible to increase the utilization rate of users by including a place recommending function based on user's preference. Experimental results show that the proposed system can increase the efficiency of using by the user-dependent mid-point navigation and place recommendation function.