• Title/Summary/Keyword: Website Log

Search Result 28, Processing Time 0.082 seconds

An Study of Operational Strategy for Special Libraries on Social Network Service (SNS) (전문도서관의 소셜네트워크서비스 운영방안 연구 - 해양과학도서관 사례를 중심으로 -)

  • Han, Jong Yup;Lee, Seungmin;Seo, Man Deok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.3
    • /
    • pp.335-351
    • /
    • 2014
  • This study proposes a customized SNS operational strategy for special libraries based on a case study on the Ocean Science Library (OSL) of South Korea. The study conducted an in-depth analysis on an organizational structure, manpower, contents, and promotion. The outcome of SNS operational strategy deducted from this study can be categorized into several items, including: (1) a selection of an appropriate SNS channel, which meets the objective of the operation; (2) a formal division of works for SNS operation; (3) a designation of full-time managers and an establishment of a task force team; (4) a specialization of contents according to specific subjects; (5) on/off-line promotions focused on events, which encourage participations; (6) an improvement of contents through regular log analyses; and (7) a promotion of library website access through SNS, and so on. This research also suggested the strategies for the development of SNS operation: strengthening of communication and cooperation among librarians; distribution of academic and research outcomes of the umbrella organization; enhancement of a role as a communication channel between librarians and users, and carry out a role as a 'social curator.'

IECS: an Integrated E-Community System for Management, Decision and Service

  • Bo, Yu;Wang, Hongding;Peng, Zhang;Tong, Yunhai;Tang, Shiwei;Yang, Dongqing
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.375-387
    • /
    • 2004
  • The paper presents an Integrated E-Community System (IECS) for management, decision and service, designed for the e-government project of Haishu District of Ningbo, Zhejiang, China. The project need is to promote the integration of management information and service information of communities, providing a unified platform on which different departments of the district government can share and exchange community information, government officers can analyze information and make decisions, and the outside users can access and request services. To meet the project need, the IECS consists of five parts: 1) The Central DataBase (CDB) that stores all information related with management, decision and service of communities: 2) Information Extracting Subsystem (IES) that provides functions of extracting data from data sources, transforming and loading them into the CDB for system administrators; 3) Information Management Subsystem (IMS) that provides functions of querying and sharing of information for government users, and functions of information maintenance, rights and log management for system administrators: 4) Intelligent Analysis Subsystem (IAS) that provides functions of extracting analysis related data from the CDB and loading them into the DW, and functions of multi-dimensional analysis and decision-making based on the DW and OLAP for government users; 5) Information Service Website (ISW) that provides functions of promulgating and collecting of information for government users and system administrators, and functions of browsing, querying and requesting of service information for outside users. The IECS supports management, decision and service of a government based on a unified data platform--the CDB, and ensures data security by providing different workplaces and rights for different users. In the real application, the system works well.

  • PDF

Authentication of a smart phone user using audio frequency analysis (음향 주파수 분석을 이용한 스마트폰 사용자 인증)

  • Kim, Jin-Bok;Song, Jeong-Eun;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.327-336
    • /
    • 2012
  • In this paper, we propose user authentication methods using a microphone and a speaker in smart phones. The proposed methods guarantee that the user is located close to the target device by transmitting the challenge via an audio channel. We propose two authentication methods; user authentication for a PC or a website using a smart phone as a hardware token, and user authentication to log on to a smart phone using a PC as a token. Because our methods use typical peripheral devices such as a microphone and a speaker, they do not require any special-purpose hardware equipment. In addition, the elderly and the handicapped can easily use our methods because the methods are activated by simple operations.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

User Perspective Website Clustering for Site Portfolio Construction (사이트 포트폴리오 구성을 위한 사용자 관점의 웹사이트 클러스터링)

  • Kim, Mingyu;Kim, Namgyu
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.59-69
    • /
    • 2015
  • Many users visit websites every day to perform information retrieval, shopping, and community activities. On the other hand, there is intense competition among sites which attempt to profit from the Internet users. Thus, the owners or marketing officers of each site try to design a variety of marketing strategies including cooperation with other sites. Through such cooperation, a site can share customers' information, mileage points, and hyperlinks with other sites. To create effective cooperation, it is crucial to choose an appropriate partner site that may have many potential customers. Unfortunately, it is exceedingly difficult to identify such an appropriate partner among the vast number of sites. In this paper, therefore, we devise a new methodology for recommending appropriate partner sites to each site. For this purpose, we perform site clustering from the perspective of visitors' similarities, and then identify a group of sites that has a number of common customers. We then analyze the potential for the practical use of the proposed methodology through its application to approximately 140 million actual site browsing histories.

Experiencing with Splunk, a Platform for Analyzing Machine Data, for Improving Recruitment Support Services in WorldJob+ (머신 데이터 분석용 플랫폼 스플렁크를 이용한 취업지원 서비스 개선에 관한 연구 : 월드잡플러스 사례를 중심으로)

  • Lee, Jae Deug;Rhee, MoonKi Kyle;Kim, Mi Ryang
    • Journal of Digital Convergence
    • /
    • v.16 no.3
    • /
    • pp.201-210
    • /
    • 2018
  • WorldJob+, being operated by The Human Resources Development Service of Korea, provides a recruitment support services to overseas companies wanting to hire talented Korean applicants and interns, and support the entire course from overseas advancement information check to enrollment, interview, and learning for young job-seekers. More than 300,000 young people have registered in WorldJob+, an overseas united information network, for job placement. To innovate WorldJob+'s services for young job-seekers, Splunk, a powerful platform for analyzing machine data, was introduced to collate and view system log files collected from its website. Leveraging Splunk's built-in data visualization and analytical features, WorldJob+ has built custom tools to gain insight into the operation of the recruitment supporting service system and to increase its integrity. Use cases include descriptive and predictive analytics for matching up services to allow employers and job seekers to be matched based on their respective needs and profiles, and connect jobseekers with the best recruiters and employers on the market, helping job seekers secure the best jobs fast. This paper will cover the numerous ways WorldJob+ has leveraged Splunk to improve its recruitment supporting services.

Exonic SNP (rs7144, 3’-UTR) in CD46 Molecule and Complement Regulatory Protein (CD46) Gene Associated with Excess Syndrome to Categorize Korean Bronchial Asthma Patients (한국인 기관지 천식 허증(虛證), 실증(實證) 환자와 CD46 유전자 다형성과의 관계)

  • Lee, Mei;Baek, Hyun-jung;Park, Eui-keun;Kim, Kwan-il;Lee, Beom-joon;Kim, Su-kang;Chung, Joo-ho;Kim, Jin-ju;Kim, Mi-a;Jung, Hee-jae;Jung, Sung-ki
    • The Journal of Internal Korean Medicine
    • /
    • v.36 no.4
    • /
    • pp.547-561
    • /
    • 2015
  • Objectives In this study, we divided Korean asthma patients into excess syndrome or deficiency syndrome groups according to clinical phenotype. Genetic analysis was conducted to investigate the association of exonic SNPs in the CD46 gene polymorphism with the clinical phenotype based on the differentiation syndrome of the bronchial asthma patients.Methods There were 95 healthy patients (control group) and 53 asthma patients. (The deficiency syndrome group included 24 and the excess syndrome group 29). We searched the exonic areas of the CD46 gene in the NCBI website SNPs with <0.01 minor allele frequency (MAF) and <0.01 heterozygosity. We finally selected two SNPs: rs138843816, Ser13Phe and rs7144, 3’-UTR. Hardy-Weinberg equilibrium was calculated using SNPStats.Results There were significant differences in the codominant 1 model and the dominant model between the healthy group and the asthma group. There were significant differences between deficiency syndrome group and the excess syndrome group in the genotype frequencies and in the codominant 1 model, the dominant model, and the log-additive model. The allele frequency of rs7144C showed a significant difference between the deficiency syndrome group and the excess syndrome group. Two-SNP haplotype analysis showed a significant difference in frequency in the deficiency syndrome group and in the excess syndrome group. There were significant differences between the healthy group and the excess syndrome group in the codominant 1 model, the dominant model, and the log-additive model. The frequency of the rs7144 C allele exhibited a significant difference in the demonstration. SNP haplotype analysis between the healthy group and the excess syndrome group showed a significant difference in the frequency of the CT haplotype and the CC haplotype.Conclusions The results indicate that two CD46 SNPs (rs138843816, Ser13Phe and rs7144, 3′–UTR) might be associated with the symptomatic excess syndrome in Korean asthma patients.

Clickstream Big Data Mining for Demographics based Digital Marketing (인구통계특성 기반 디지털 마케팅을 위한 클릭스트림 빅데이터 마이닝)

  • Park, Jiae;Cho, Yoonho
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.3
    • /
    • pp.143-163
    • /
    • 2016
  • The demographics of Internet users are the most basic and important sources for target marketing or personalized advertisements on the digital marketing channels which include email, mobile, and social media. However, it gradually has become difficult to collect the demographics of Internet users because their activities are anonymous in many cases. Although the marketing department is able to get the demographics using online or offline surveys, these approaches are very expensive, long processes, and likely to include false statements. Clickstream data is the recording an Internet user leaves behind while visiting websites. As the user clicks anywhere in the webpage, the activity is logged in semi-structured website log files. Such data allows us to see what pages users visited, how long they stayed there, how often they visited, when they usually visited, which site they prefer, what keywords they used to find the site, whether they purchased any, and so forth. For such a reason, some researchers tried to guess the demographics of Internet users by using their clickstream data. They derived various independent variables likely to be correlated to the demographics. The variables include search keyword, frequency and intensity for time, day and month, variety of websites visited, text information for web pages visited, etc. The demographic attributes to predict are also diverse according to the paper, and cover gender, age, job, location, income, education, marital status, presence of children. A variety of data mining methods, such as LSA, SVM, decision tree, neural network, logistic regression, and k-nearest neighbors, were used for prediction model building. However, this research has not yet identified which data mining method is appropriate to predict each demographic variable. Moreover, it is required to review independent variables studied so far and combine them as needed, and evaluate them for building the best prediction model. The objective of this study is to choose clickstream attributes mostly likely to be correlated to the demographics from the results of previous research, and then to identify which data mining method is fitting to predict each demographic attribute. Among the demographic attributes, this paper focus on predicting gender, age, marital status, residence, and job. And from the results of previous research, 64 clickstream attributes are applied to predict the demographic attributes. The overall process of predictive model building is compose of 4 steps. In the first step, we create user profiles which include 64 clickstream attributes and 5 demographic attributes. The second step performs the dimension reduction of clickstream variables to solve the curse of dimensionality and overfitting problem. We utilize three approaches which are based on decision tree, PCA, and cluster analysis. We build alternative predictive models for each demographic variable in the third step. SVM, neural network, and logistic regression are used for modeling. The last step evaluates the alternative models in view of model accuracy and selects the best model. For the experiments, we used clickstream data which represents 5 demographics and 16,962,705 online activities for 5,000 Internet users. IBM SPSS Modeler 17.0 was used for our prediction process, and the 5-fold cross validation was conducted to enhance the reliability of our experiments. As the experimental results, we can verify that there are a specific data mining method well-suited for each demographic variable. For example, age prediction is best performed when using the decision tree based dimension reduction and neural network whereas the prediction of gender and marital status is the most accurate by applying SVM without dimension reduction. We conclude that the online behaviors of the Internet users, captured from the clickstream data analysis, could be well used to predict their demographics, thereby being utilized to the digital marketing.