• Title/Summary/Keyword: and user behavior

Search Result 1,691, Processing Time 0.024 seconds

A Study on the User Problem Behavior in Overseas Public Libraries (국외 공공도서관의 이용자 문제행동에 대한 대처방안분석)

  • Lee Eun-Ju;Youn You-Ra
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.187-192
    • /
    • 2023
  • A problem user in a library refers to a person who harasses others or causes a disturbance through inappropriate behavior in the library. Users' continued problematic behavior reduces the work productivity of librarians and at the same time causes inconvenience to other users. This may cause a decline in the free use of public libraries. In Korea, a user response manual has been developed to guide librarians to respond wisely to user problem behavior. However, it is true that most of the content provides guidance on how to communicate with problem users, and there is a lack of countermeasures to stipulate and regulate follow-up measures against them. The goal of this study is to further systematize response and organize them into written regulations. To this end, this study to examine regulations and legal battles surrounding problem users in oversea public libraries and to examine what can be applied in Korea in the future.

Context based User Required Services Reasoning Model (상황 정보 기반 사용자 요구 서비스 추론 모델)

  • Ko, Kwang-Enu;Sim, Kwee-Bo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.1
    • /
    • pp.21-26
    • /
    • 2008
  • It was already realized at a current technological level of home network systems that the systems recognizes a user's simple order and carry out the order in the ubiquitous computing environment. However home is not a simple environment consisting into a large number of family members, so various order and situation would be needed accordingly. From now on we need to reach the technological level to infer that how is the user's behavior patterns and what kinds of service is the fittest to user who belong to the ubiquitous computing environment by using the result of the context interpreter. In this regards, active inferred-model needs to be suggested upgrading user's command into one step more higher level than the simple one adapting diversified feature. This study would like to suggest this active model recognizing context, which is user's environmental information applying basic network and inferring Context-based Service that user wants through the recognized result This study proposes a new method that can infer the user's desire in ubiquitous computing environment. First of all, we define a context as user's information of ubiquitous computing environment situation that user belongs to and we classify the context into 4W1H(Where, Who, When, What) formats. We construct Bayesian network and put the factor of context use as Bayesian network nodes. As a result, we can infer the user's behavior pattern and most proper service for user in the intelligent space from the probabilistic result of Bayesian network.

Design & Evaluation of an Intelligent Model for Extracting the Web User' Preference (웹 사용자의 선호도 추출을 위한 지능모델 설계 및 평가)

  • Kim, Kwang-Nam;Yoon, Hee-Byung;Kim, Hwa-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.4
    • /
    • pp.443-450
    • /
    • 2005
  • In this paper, we propose an intelligent model lot extraction of the web user's preference and present the results of evaluation. For this purpose, we analyze shortcomings of current information retrieval engine being used and reflect preference weights on learner. As it doesn't depend on frequency of each word but intelligently learns patterns of user behavior, the mechanism Provides the appropriate set of results about user's questions. Then, we propose the concept of preference trend and its considerations and present an algorithm for extracting preference with examples. Also, we design an intelligent model for extraction of behavior patterns and propose HTML index and process of intelligent learning for preference decision. Finally, we validate the proposed model by comparing estimated results(after applying the Preference) of document ranking measurement.

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.

User Behavior Classification for Contents Configuration of Life-logging Application (라이프로깅 애플리케이션 콘텐츠 구성을 위한 사용자 행태 분류)

  • Kwon, Jieun;Kwak, Sojung;Lim, Yoon Ah;Whang, Min Cheol
    • Science of Emotion and Sensibility
    • /
    • v.19 no.4
    • /
    • pp.13-20
    • /
    • 2016
  • Recently, life-logging service which has expanded to measure and record the daily life of the users and to share with others are increasing. In particular, as life-logging services based on the application has become popular with the development of wearable-devices and smart-phones, the contents of this service are produced by user behavior and are provided in infographic menu form. The purpose of this paper is to extract user behavior and classify for making contents items of life-logging service. For this paper, the first of all, we discuss the definition and characteristics of life-logging and research the contents based on user behavior related to life-logging by the publications including thesis, articles, and books. Secondly, we extract and classify the user behavior to build the contents for life-logging service. We gather users' action words from publication materials, researches, and contents of existing life-logging service. And then collected words are analyzed by FGI (Focus Group Interview) and survey. As the result, 39 words which suit for contents of life-logging service are extracted by verify suitability. Finally, the extracted 39 words are classified for 19 categories -'Eat', 'Keep house', 'Diet', 'Travel', 'Work out', 'Transit', 'Shoot', 'Meet', 'Feel', 'Talk', 'Care for', 'Drive', 'Listen', 'Go online', 'Sleep', 'Go', 'Work', 'Learn', 'Watch' - which are suggested by the surveys, statistical analysis, and FGI. We will discuss the role and limitations of this results to build contents configuration based on life-logging application in this study.

Ontology-based User Intention Recognition for Proactive Planning of Intelligent Robot Behavior (지능형로봇 행동의 능동적 계획수립을 위한 온톨로지 기반 사용자 의도인식)

  • Jeon, Ho-Cheol;Choi, Joong-Min
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.1
    • /
    • pp.86-99
    • /
    • 2011
  • Due to the uncertainty of intention recognition for behaviors of users, the intention is differently recognized according to the situation for the same behavior by the same user, the accuracy of user intention recognition by minimizing the uncertainty is able to be improved. This paper suggests a novel ontology-based method to recognize user intentions, and able to minimize the uncertainties that are the obstacles against the precise recognition of user intention. This approach creates ontology for user intention, makes a hierarchy and relationship among user intentions by using RuleML as well as Dynamic Bayesian Network, and improves the accuracy of user intention recognition by using the defined RuleML as well as the gathered sensor data such as temperature, humidity, vision, and auditory. To evaluate the performance of robot proactive planning mechanism, we developed a simulator, carried out some experiments to measure the accuracy of user intention recognition for all possible situations, and analyzed and detailed described the results. The result of our experiments represented relatively high level the accuracy of user intention recognition. On the other hand, the result of experiments tells us the fact that the actions including the uncertainty get in the way the precise user intention recognition.

A Study of User Perception on Features Used in Behavior-Based Authentication (행위 기반 인증을 위한 사용자 중심의 인증 요소 분석 연구)

  • Lee, Youngjoo;Ku, Yeeun;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.127-137
    • /
    • 2019
  • The growth in smartphone service has given rise to an increase in frequency and importance of authentication. Existing smartphone authentication mechanisms such as passwords, pattern lock and fingerprint recognition require a high level of awareness and authenticate users temporarily with a point-of-entry techniques. To overcome these disadvantages, there have been active researches in behavior-based authentication. However, previous studies focused on enhancing the accuracy of the authentication. Since authentication is directly used by people, it is necessary to reflect actual users' perception. This paper proposes user perception on behavior-based authentication with feature analysis. We conduct user survey to empirically understand user perception regarding behavioral authentication with selected authentication features. Then, we analyze acceptance of the behavioral authentication to provide continuous authentication with minimal awareness while using the device.

A Study on the User Behavior in the Outpatient Department of Psychiatry (외래진료부문 정신건강의학과 이용자 행태 관찰 연구)

  • Lee, Hyunji;Lee, Haekyung;Chai, Choulgyun
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.21 no.2
    • /
    • pp.45-53
    • /
    • 2015
  • Purpose: This study is to derive the behavioral characteristics of the users appear in the outpatient department of psychiatry. Methods: By referencing John Zeisel's Tools for environment-behavior research, observation of user behavior and expert interviews as a method of the study has been carried out. Results: The results of this study are as follows. First, adjacent placement among children, youth and regular the outpatient department of psychiatry is necessary and easy access to internal medicine department and family medicine department is required in order to allow cooperated treatments. Secondly, depending on the characteristics of the outpatient department of psychiatry treatment, adjustment of space requirement or the change of kinds of necessary space is required. Third, considering the psychological and behavioral characteristics of mental illness and guardians, various search for the environment that can support this. Implications: This study is a basic research for space improvement and evaluation of the outpatient department of psychiatry, and need to be followed by further study using various perspectives and methods.

A Study for Context-Awareness based on Multi-Sensor in the Smart-Clothing (스마트의류에서 멀티센서 기반의 상황인지에 관한 연구)

  • Park, Hyun-Moon;Jeon, Byung-Chan;Ryu, Daehyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.71-78
    • /
    • 2013
  • In this paper, we propose a method to infer the user's behavior and situation through collected data from multi-sensor equipped with a smart clothing and it was implemented as a smartphone App. User context reasoning and behavior determine is very difficult using single sensor depending on the measured value of the sensor varies from environmental noise. So, the reasoning and the digital filter algorithms to determine user behavior reducing noise and are required. In this paper, we used EWMA, Kalman Filter and SVM processing behavior for 3-axis value as a representative value of one.

A Research on the Intelligent E-mail System Using User Patterns (사용자 패턴을 이용한 지능형 e-메일 시스템의 연구)

  • Lim Yang-Won;Lim Han-Kyu
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.64-71
    • /
    • 2006
  • Electronic mail (E-mail) is an integral part of communication for the recent Internet users. However, e-mail has also come to serve as a means to support flood of unwanted spam mails and junk mails having bad purposes. This paper was conducted in order to develop an intelligent e-mail system using user behavior pattern that can prevent these unnecessary information and enable the user to enjoy communication via e-mail in a cleaner environment. The concentrated analysis of the user behavior in terms of using e-mail functions has resulted in better classification between unnecessary and necessary information, thereby facilitating faster disposal of spam mails.

  • PDF