• Title/Summary/Keyword: User behavior analysis

Search Result 760, Processing Time 0.025 seconds

A Study on Residential Facility Based on the Characteristics of Behavior and Motion for People with visual Impairments (주거 공간 계획을 위한 시각장애인의 행위에 따른 동작특성에 관한 연구)

  • Kim, Min-Gyeong;Keum, Yo-Chan;Park, Yong-Hwan
    • Korean Institute of Interior Design Journal
    • /
    • v.15 no.2 s.55
    • /
    • pp.99-107
    • /
    • 2006
  • People with visual impairments are difficult to go to education facility by themselves, because of their limited visual ability, orientation, and usability field, so they prefer dormitories. Those dormitories playa role in living space, education, communication and culture function. Therefore those facilities planned more user centered design, since they are influenced by user actability and their values. User centered designs that match between the user and space are understood as well as their characteristics and behavior. Especially for understanding their activity, observation is conducted about their behavior in dormitories. Thus the purpose of this study is suggested to be a basic source that planning about residential facility for people with visual impairments through interview and observation investigation by analysis that they resident in space motion and performance.

A Study on the Current Trends of User Study at the Knowledge Based Information Society (지식기반사회에서 이용자연구의 최신동향)

  • Han, Bock-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.37 no.4
    • /
    • pp.295-310
    • /
    • 2003
  • This study used content analysis to examine research methods and trends of the user study articles from 1991 to 2003. Analysis measured research subjects, research method, data collection methods, data analysis methods, hypotheses. The average yearly papers in the case of scholarly journal - 2.8 pieces. The year published the largest number of papers is 2001. The order of the number of papers information behavior, user study, user interface, user education, OPAC use. Used research methods are literature search and survey research, data analysis methods are $X^2$, correlation and T-test.

A Contingent Analyses on the Relationship Between the Characteristics of Internet Shopping Mall and User Acceptance (인터넷 쇼핑몰의 특성과 사용자 수용간의 상황적 관계분석)

  • Suh, Kun-Soo
    • Asia pacific journal of information systems
    • /
    • v.11 no.2
    • /
    • pp.23-55
    • /
    • 2001
  • It is generally agreed that realizing the full potential of the internet shopping mall(ISM) requires careful identification of customer needs and expectations. However, a quantitative framework to explain and predict users' behavior toward ISM has not been well established because the research on the user acceptance of ISM is still in its infancy. This study proposes a model which uses factor analysis to identify factors of ISM characteristics and individual characteristics affecting user acceptance of ISM. Predictive models based on the multiple regression analyses select the factors and their interactions with individual characteristics that significantly influence user acceptance. Results show that five factors including economy, convenience, credibility, reliability, information risks, and performance risks affects user acceptance. In addition, individual differences in terms of innovativeness, playfulness, and recreational shopping traits have both direct and interaction effects on user acceptance. The implication of this study is that, although user attitudes towards ISM characteristics in general are important to their acceptance behavior, the level of importance depends upon different user groups.

  • PDF

A Real-Time User Authenticating Method Using Behavior Pattern Through Web (웹 사용자의 실시간 사용 패턴 분석을 이용한 정상 사용자 판별 방법)

  • Jang, Jin-gu;Moon, Jong Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1493-1504
    • /
    • 2016
  • As cyber threats have been increased over the Internet, the invasions of personal information are constantly occurring. A malicious user can access the Web site as a normal user using leaked personal information and does illegal activities. This paper proposes an effective method which authenticates a genuine user with real-time. The method use the user's profile which is a record of user's behavior created by Membership Analysis(MA) and Markov Chain Model(MCM). In addition to, user's profile is augmented by a Time Weight(TW) which reflects the user's tendency. This method can detect a malicious user who camouflage normal user. Even if it is a genuine user, it can be determined as an abnomal user if the user acts beyond the record profile. The result of experiment showed a high accuracy, 96%, for the correct user.

An Empirical Study about Internet and Social Network Security Behavior of End User (최종사용자의 인터넷과 소셜 네트워크 보안 행동에 대한 실증 연구)

  • Park, Kyung-Ah;Lee, Dae-Yong;Koo, Chul-Mo
    • The Journal of Information Systems
    • /
    • v.21 no.4
    • /
    • pp.1-29
    • /
    • 2012
  • The purpose of this study was to find about personal information security of internet and social networks by focusing on end users. User competence and subjective criterion, which are the antecedents, are affecting security behaviors For these security behaviors, the study examined the relationship between security behavior intention on internet use and security behavior intention about social network that is actively achieved in many fields. Behaviors of internet and social network were classified into an action of executing security and an action of using a security technology. In addition, this study investigated a theory about motivational factors of personal intention on a certain behavior based on theory of reasoned action in order to achieve the purpose of this study. A survey was conducted on 224 general individual users through online and offline, and the collected data was analyzed with SPSS 12.0 and SmartPLS 2.0 to verify demographic characteristics of respondents, exploratory factor analysis, and suitability of a study model. Interesting results were shown that security behavior intention of social network is not significant in all security behavior execution, which is security performance behavior, and security technology use. Internet security behavior is significant to security technology use but it does not have an effect on behavior execution.

Factors Affecting User's Behavior of Smartphone: Integrated Model of Service Distribution, Addiction and Consequence

  • LEE, Won-Jun;SHIN, Luke Yunkeun
    • Journal of Distribution Science
    • /
    • v.20 no.11
    • /
    • pp.99-108
    • /
    • 2022
  • Purpose: The wide distribution of smartphones has changed life and user behavior. This phenomenon has both advantages and disadvantages for users. As smartphones become a part of our daily lives, smartphone addiction has recently become a social issue in many countries. This study explores factors that affect smartphone addiction and the consequences of addictive behaviors. Research design, data and methodology: Our model hypothesizes that four key factors determine addictive behavior: flow, enjoyment, preference for online social life, and escape reality. Commitment and compulsive use are mediating variables that connect key drivers and addictive results. Based on the SEM (structural equation model) analysis of 497 survey responses, these four driving factors each have a significant effect on the compulsive use of smartphones directly or indirectly; the compulsive use of smartphones directly influences the three results Results: We conducted a reliability and validity analysis, and the results were successful. In the hypothesis test, every path is accepted as expected at the significance level of 0.05. Conclusions: Among the four driving factors, escape reality is the vital factor influencing smartphone addiction and its consequences. And anxiety is the number one consequence influenced by the compulsive use of smartphones.

A Study on User Behavior of Input Method for Touch Screen Mobile Phone (터치스크린 휴대폰 입력 방식에 따른 사용자 행태에 관한 연구)

  • Jun, Hye-Sun;Choi, Woo-Sik;Pan, Young-Hwan
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.173-178
    • /
    • 2008
  • Due to a rapid increase in demand for bigger-screen-equipped mobile phones in recent years, many big-name-manufactures have been releasing touch-screen-enabled devices. In this paper, various touch-screen-input methods have been summarized into 6 different categories. How? By tracing each user's finger print path, user's input pattern and behavior have been carefully recorded and analyzed. Through this analysis, what to be considered before designing UI is presented in great details.

  • PDF

Application of the Affordance as User Experience Behavior Setting for Architectural Design (건축공간의 경험구조로서 지원성 적용 연구)

  • Kim Soo-Jin
    • Korean Institute of Interior Design Journal
    • /
    • v.13 no.6
    • /
    • pp.48-56
    • /
    • 2004
  • The Affordance, discussed in the theory of ecological perception of environmental psychology, is the concept of perception that deals with inter-relationship between environment and human. It is a theory seeking for gradual evolution, with the change of user experience behavior and the space, by getting feed-backs from the analysis of perception of characteristics of 3-dimensional space and the user as moving entity. Although there has been many attempts to define the Affordance and apply its concept to the architecture, now there's a need to identify the Affordance in the real architectural space, represent Affordance of space and the user inter-relationship in the architecture and apply its design specifically, Thus, the purpose of this study is to present the methodology of applying Affordance in architectural space design by identifying the Affordance of space concept of human experience behavior in the architectural space and analyze its recognition process.

A Study of User's Characteristics of Searching Behavior on the World-Wide Web (인터넷 이용자의 검색 행동 성향에 관한 연구)

  • Oh Kyung-Mook;Hwang Sang-Kyu;Rhi Yong-Hyun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.33 no.3
    • /
    • pp.87-108
    • /
    • 1999
  • Information retrieval on World Wide Web is very different from the one in traditional environment. Since Internet user's searching behavior shows it's own special search characteristics, a study of user's specific characteristics is necessary to offer better services. Through analysis and examination of Internet user behaviors, we suggest guidelines of design for developing Internet -based information retrieval systems.

  • PDF

Mobile User Behavior Pattern Analysis by Associated Tree in Web Service Environment

  • Mohbey, Krishna K.;Thakur, G.S.
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.2
    • /
    • pp.33-47
    • /
    • 2014
  • Mobile devices are the most important equipment for accessing various kinds of services. These services are accessed using wireless signals, the same used for mobile calls. Today mobile services provide a fast and excellent way to access all kinds of information via mobile phones. Mobile service providers are interested to know the access behavior pattern of the users from different locations at different timings. In this paper, we have introduced an associated tree for analyzing user behavior patterns while moving from one location to another. We have used four different parameters, namely user, location, dwell time, and services. These parameters provide stronger frequent accessing patterns by matching joins. These generated patterns are valuable for improving web services, recommending new services, and predicting useful services for individuals or groups of users. In addition, an experimental evaluation has been conducted on simulated data. Finally, performance of the proposed approach has been measured in terms of efficiency and scalability. The proposed approach produces excellent results.