• Title/Summary/Keyword: User behavior

Search Result 1,743, Processing Time 0.029 seconds

The influence of evaluation factors of overseas direct sales website on the continuous intention of Chinese consumers (대(對)중국 역직구사이트 평가요인이 지속적 이용의도에 미치는 영향)

  • Son, Je-Young;Kang, In-Won
    • Korea Trade Review
    • /
    • v.43 no.3
    • /
    • pp.219-243
    • /
    • 2018
  • This study focused on the rapidly growing Chinese market by developing an evaluation model for overseas direct sales websites for Chinese consumers. In addition, we developed specific strategic alternatives for each sub-market by conducting multi-group analysis for each consumer's characteristics. Results showed that the level of concern about site use had a stronger impact on persistent use behavior. In addition, among antecedents that affect the level of assurance and concern, we found that these includes not only the perceived benefits and perceived risk factors identified in previous studies but also social-cultural factors. In addition, this study compares the evaluation of overseas direct sales website according to the level of involvement of users. This study analyzes the differences in coefficients among the paths and suggest practical implications for each group.

  • PDF

A Study on Service Design of Public transportation for Transportation Vulnerable - Focused on elderly and Foreigner - (교통약자를 고려한 대중교통 서비스 디자인 연구 - 고령자 및 외국인 중심으로 -)

  • Lee, Seung Min;Pan, Young Hwan;Song, In ho
    • Design Convergence Study
    • /
    • v.15 no.2
    • /
    • pp.223-236
    • /
    • 2016
  • The infrastructure of public transportation of Seoul which has been developed in parallel with the progress of modernization receives successful performance evaluation at home and abroad, currently representing the highest transport distribution ratio. In spite of this fact, the public transportation of Seoul, which has entered into advanced phase of services, still leaves much to be desired, in particular, the mobility considering the transportation vulnerable is not well assured. It is time to provide proper supports for the efficient mobility of public transportation in accordance with the social changes present in the aging and multicultural society. This study inquired about the current status of public transportation and that of its users. In addition, the main inquiry target was oriented to the elderly and foreigners for observation and investigation, as well as for the analysis of their behavior. Furthermore, through in-depth interviews, inconvenient factors have been found according to public transportation means and its usage phase, by carrying out detailed evaluations of public transportation services. Based on this, the enhancement elements were defined and the corresponding concept was designed through a series of idea workshops, and this study intended to contribute to improving future public transportation services by proposing the improvement scheme applicable to the upcoming public transportation.

Study on Methodology of Collecting Realtime File Access Event Information (실시간 파일 접근 이벤트 정보 수집 방법에 관한 연구)

  • Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.447-448
    • /
    • 2021
  • The boundary-based security architecture has the advantage of easy deployment of security solutions and high operational efficiency. The boundary-based security architecture is easy to detect and block externally occurring security threats, but is inappropriate to block internally occurring security threats. Unfortunately, internal security threats are increasing in frequency. In order to solve this problem, a zero trust model has been proposed. The zero trust model requires a real-time monitoring function to analyze the behavior of a subject accessing various information resources. However, there is a limit to real-time monitoring of file access of a subject confirmed to be trusted in the system. Accordingly, this study proposes a method to monitor user's file access in real time. To verify the effectiveness of the proposed monitoring method, the target function was verified after the demonstration implementation. As a result, it was confirmed that the method proposed in this study can monitor access to files in real time.

  • PDF

Study on The Data Decryption and Artifacts Analysis of KakaoTalk in Windows Environment (윈도우 환경에서 카카오톡 데이터 복호화 및 아티팩트 분석 연구)

  • Minuook Jo;Nam Su Chang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.51-61
    • /
    • 2023
  • Messengers such as KakaoTalk, LINE, and Facebook Messenger are universal means of communication used by anyone. As the convenience functions provided to users and their usage time increase, so does the user behavior information remaining in the artifacts, which is being used as important evidence from the perspective of digital forensic investigation. However, for security reasons, most of the data is currently stored encrypted. In addition, cover-up behaviors such as intentional manipulation, concealment, and deletion are increasing, causing the problem of delaying digital forensic analysis time. In this paper, we conducted a study on the data decryption and artifacts analysis in a Windows environment for KakaoTalk, the messenger with the largest number of users in Korea. An efficient way of obtaining a decryption key and a method of identifying and decrypting messages attempted to be deleted are presented, and thumbnail artifacts are analyzed.

Detecting suspicious branch statements through recording and analyzing execution logs of apps using reflection (리플렉션이 사용된 앱의 실행 로그 기록 및 분석을 통한 의심스러운 분기문 탐지)

  • Sumin Lee;Minho Park;Jiman Hong
    • Smart Media Journal
    • /
    • v.12 no.5
    • /
    • pp.58-64
    • /
    • 2023
  • In Logic Bomb, the conditions of branch statements that trigger malicious behavior cannot be detected in advance, making Android malicious app analysis difficult. Various studies have been conducted to detect potentially suspicious branch statements that can be logic bombs and triggers, but suspicious branch statements cannot be properly detected in apps that contain information determined at runtime, such as reflection. In this paper, we propose a tool that can detect suspicious branch statements even when reflection is used in Android apps. It works through recording app execution logs and analyzing the recorded log). The proposed tool can check the relationship between the called method and the branch statement by recording and analyzing the user-defined methods, Java APIs called and method information called through reflection, and branch information in the log while the Android app is running. Experimental results show that suspicious branch statements can be detected even in apps where reflection is used.

A vibration-based approach for detecting arch dam damage using RBF neural networks and Jaya algorithms

  • Ali Zar;Zahoor Hussain;Muhammad Akbar;Bassam A. Tayeh;Zhibin Lin
    • Smart Structures and Systems
    • /
    • v.32 no.5
    • /
    • pp.319-338
    • /
    • 2023
  • The study presents a new hybrid data-driven method by combining radial basis functions neural networks (RBF-NN) with the Jaya algorithm (JA) to provide effective structural health monitoring of arch dams. The novelty of this approach lies in that only one user-defined parameter is required and thus can increase its effectiveness and efficiency, as compared to other machine learning techniques that often require processing a large amount of training and testing model parameters and hyper-parameters, with high time-consuming. This approach seeks rapid damage detection in arch dams under dynamic conditions, to prevent potential disasters, by utilizing the RBF-NNN to seamlessly integrate the dynamic elastic modulus (DEM) and modal parameters (such as natural frequency and mode shape) as damage indicators. To determine the dynamic characteristics of the arch dam, the JA sequentially optimizes an objective function rooted in vibration-based data sets. Two case studies of hyperbolic concrete arch dams were carefully designed using finite element simulation to demonstrate the effectiveness of the RBF-NN model, in conjunction with the Jaya algorithm. The testing results demonstrated that the proposed methods could exhibit significant computational time-savings, while effectively detecting damage in arch dam structures with complex nonlinearities. Furthermore, despite training data contaminated with a high level of noise, the RBF-NN and JA fusion remained the robustness, with high accuracy.

Coercive Marketing Stimuli and Negative Consequence: Comparative Study of Chinese and Korean Social Media (강압적 마케팅 자극이 미치는 부정적 영향: 중국과 한국 소셜 미디어 비교 연구)

  • In-won Kang;Jae-won Heo
    • Korea Trade Review
    • /
    • v.48 no.1
    • /
    • pp.287-306
    • /
    • 2023
  • This study tries to explore that the relationship between social media company's coercive and involuntary marketing stimuli and the negative consequences that have not been intensively discussed in measuring the performance of social media companies. To reflect the influence of the socio-cultural environment of country, a comparative study was conducted on major social media market in Korea and China. As result of the verification, it was found that coercive marketing stimuli had influence on social media firm's negative consequences. And there are significant differences by country in the effect of company's coercive marketing stimulus on user attitudes and negative performance. The results of this study are expected to provide practical implications for the operation of social media firms and individuals who want to do business using social media.

Metaverse Artifact Analysis through the Roblox Platform Forensics (메타버스 플랫폼 Roblox 포렌식을 통한 아티팩트 분석)

  • Yiseul Choi;Jeongeun Cho;Eunbeen Lee;Hakkyong Kim;Seongmin Kim
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.37-47
    • /
    • 2023
  • The growth of the metaverse has been accelerated by the increased demand for non-face-to-face interactions due to COVID-19 and advancements in technologies such as blockchain and NFTs. However, with the emergence of various metaverse platforms and the corresponding rise in users, criminal cases such as ransomware attacks, copyright infringements, and sexual offenses have occurred within the metaverse. Consequently, the need for artifacts that can be utilized as digital evidence within metaverse systems has increased. However, there is a lack of information about artifacts that can be used as digital evidence. Furthermore, metaverse security evaluation and forensic analysis are also insufficient, and the absence of attack scenarios and related guidelines makes forensics challenging. To address these issues, this paper presents artifacts that can be used for user behavior analysis and timeline analysis through dynamic analysis of Roblox, a representative metaverse gaming solution. Based on analyzing interrelationship between identified artifacts through memory forensics and log file analysis, this paper suggests the potential usability of artifacts in metaverse crime scenarios. Moreover, it proposes improvements by analyzing the current legal and regulatory aspects to address institutional deficiencies.

Analyses of User Behavior and Preference Factors in the Outdoor Spaces of Psychiatric Hospitals (정신병원 옥외공간의 이용행태 및 선호요인 분석)

  • Ahn, Deug-Soo
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.42 no.6
    • /
    • pp.72-88
    • /
    • 2014
  • This study was conducted in order to analyze user behavior and preference factors in the outdoor spaces of mental hospitals. Among hospitals with 250 or more beds, 5 hospitals were selected in consideration of size of garden and diversity of garden elements. The subject of the study was restricted to mild cases of schizophrenia while 30~50 patients were selected on the recommendation of their doctor from 5 hospitals, respectively. The physical environment was analyzed, focusing on space components, after visiting the sites of study. A face to face interview method was selected in consideration of patients' cognitive abilities, a total of 230 questionnaires were used for the analysis. The results of the study can be summarized as follows. Rest facilities occupy the largest numbers in the components of garden, and those are followed by landscape facilities, walking/exercise facilities, and experience facilities. Outdoor walking/exercise programs are classified into group walks and free walks with most patients taking group walks. Most of the patients visit these outdoor spaces every day but some of them rarely use the outdoor areas. In order to increase the efficiency of using these outdoor spaces, the percentage of space for ensuring a sense of control should properly harmonize with the percentage of space to facilitate patients in having social contact. With regard to the reasons for preferring the most widely-used outdoor spaces, landscape/environment property was the most important, followed by functionality and then accessibility. Major activities in the preferred space are mainly composed of walking/exercise and rest. The preferred facilities are waterscape facilities such as ponds, waterfalls and fountains, rest facilities such as pergolas and shade trees, and lawn. It was understood that naturalness should be considered to be the most important factor in constructing a new healing garden, followed by aesthetics and amenities. Single facilities rated by preference for introduction were flower beds, trails, and lawn. According to type, waterscape facilities such as fountains, ponds, waterfalls and waterwheels were most preferred. Space for natural distraction and programs for the cultivation of flower beds were also preferred. The ideal image of a healing garden should be bright, familiar, and orderly as a whole, having plenty of introduced facilities. Open spaces were preferred to enclosed spaces. Finally, the image of a garden that helps patients feel calm was thought to be that of the most ideal garden.

Importance-Satisfaction Analysis of Meditation Forest in Schools - Focusing on Middle Schools in Gwang-Ju City - (명상숲의 중요도-만족도 평가 - 광주광역시 중학교를 대상으로 -)

  • Kang, Taesun;Jeong, Moonsun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.4
    • /
    • pp.68-80
    • /
    • 2019
  • This study is to provide basic data for the user-oriented design for a middle school meditation forest in the future by analyzing the physical environment characteristics of existing middle school meditation forests, the users' utilization behavior, and the degree of the importance satisfaction. For this purpose, 24 evaluation indices based on site characteristics, naturalness, functionality, and the effectiveness of meditation forest sites were selected for analysis of importance satisfaction. We surveyed and analyzed the students and teachers of two middle schools 'A' and 'B' in Gwangju Metropolitan City. The results of this study are as follows. First, the perception and utilization rates of the meditation forests by students was significantly lower than teachers at both schools. 'A' school has a better use and recognition rate than the 'B' school. Second, the purposes of using meditation forests were rest (49.6%), weekday lunchtime (63.6%), with friends (65.0%) or colleagues (60%), and short (less than 10 minutes) rests (68.6%). They preferred flowers (30.0%) and shading plants (28.9%), mainly using shelters (57.9%) and walking trails (37.1%). Third, as a result of the importance of satisfaction analysis, the average score of the 24 items importance (3.81), higher than the satisfaction (3.62). The 24 items positioned in 4 quadrants are as follows: Nine items are in the I quadrant for 'persistent maintenance'. Three items are in the II quadrant for 'priority correction'. Seven items are in the quadrant III for 'low priority in the management and operation'. Five items are in the quadrant IV for 'avoid over effort'. For the comparison of two middle schools' satisfaction, 'A' school satisfaction was higher than 'B' school for 16 items, which showed a statistically significant difference. It is believed that the users in 'A' school are more satisfied than 'B' school because it has more forests and trails, better accessibility, and a variety of plant types and planting areas in the A school meditation forest. The results of the overall satisfaction analysis showed a significant difference between 'A' school (68.0%) and 'B' school (47.2%) as 'A' school has better shelters and trails. The rankings of the most satisfying space are walking trails (1st place) and shelters (2nd place). The reason for the highest satisfaction was for rest (stress relief and emotional support) in both 'A' and 'B' schools.