• Title/Summary/Keyword: information user

Search Result 18,134, Processing Time 0.036 seconds

User attribute verification method using user mobile dynamic information

  • Kim, Seok-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.145-149
    • /
    • 2019
  • Various supplementary authentication methods are used to supplement user authentication and authorization provided by existing password verification online1. In recent years, authentication and authorization methods using user attribute information have been studied and utilized in various services. User attribute information can be divided into static information and dynamic information. The existing methods focus on research to identify users using dynamic information or to generate challenge questions for user reauthentication. Static information such as a user's home address, school, company, etc. is associated with dynamic information such as location information. We propose a method to verify user attribute information by using the association between two attribute information. For this purpose, the static information of the user is verified by using the user's location record which is dynamic information. The experiment of this paper collects the dynamic information of the actual user and extracts the static information to verify the user attributes. And we implemented the user attribute information authentication system using the proposal verification method and evaluated the utility based on applicability, convenience, and security.

A Study of user-centric service model and user satisfaction analysis for information service

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.92-97
    • /
    • 2009
  • Lately, influence of information rises and interest about satisfaction estimation of information providing service is risin. According to rapid change in information environment, information-providing service is being changed in various form, in which center development is made in relation to the effort for customer satisfaction intended to enhance user's satisfaction level through providing more convenient and higher service centered on information service user rather than information service provider. Organizations providing information service is also changing their service from traditional one centered on service provider to that for user's satisfaction and service quality, and evaluation of information service quality and measurement of user's satisfaction as the result of using information service are regarded important. In this respect, it is needed to measure user's satisfaction level for environmental factors of information service and analyze what kind of influence they have to enhance user's satisfaction level of information service. Also function and efficiency of information offer service are important. Therefore, interest for satisfaction survey to heighten contents satisfaction of information-providing service, service satisfaction, satisfaction of user of system satisfaction is increased. In this paper, we propose a model of the user satisfaction index for information-providing services and present the user satisfaction index is measured to the model. Also we this study suggest qualitative improvements of information-providing service required for change to user-centric information-providing service through measuring user satisfaction index of ITFIND system and schemes to improve information quality

User Reputation computation Method Based on Implicit Ratings on Social Media

  • Bok, Kyoungsoo;Yun, Jinkyung;Kim, Yeonwoo;Lim, Jongtae;Yoo, Jaesoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1570-1594
    • /
    • 2017
  • Social network services have recently changed from environments for simply building connections among users to open platforms for generating and sharing various forms of information. Existing user reputation computation methods are inadequate for determining the trust in users on social media where explicit ratings are rare, because they determine the trust in users based on user profile, explicit relations, and explicit ratings. To solve this limitation of previous research, we propose a user reputation computation method suitable for the social media environment by incorporating implicit as well as explicit ratings. Reliable user reputation is estimated by identifying malicious information raters, modifying explicit ratings, and applying them to user reputation scores. The proposed method incorporates implicit ratings into user reputation estimation by differentiating positive and negative implicit ratings. Moreover, the method generates user reputation scores for individual categories to determine a given user's expertise, and incorporates the number of users who participated in rating to determine a given user's influence. This allows reputation scores to be generated also for users who have received no explicit ratings, and, thereby, is more suitable for social media. In addition, based on the user reputation scores, malicious information providers can be identified.

A Study on the Effects of CIOs' Managerial Roles on Users (정보담당 최고임원 (CIO)의 경영자 역할이 사용자에 미치는 직접적 영향에 관한 연구)

  • Lee, Jae-Beom;An, Sang-Hyeop
    • Asia pacific journal of information systems
    • /
    • v.7 no.3
    • /
    • pp.125-143
    • /
    • 1997
  • As information is the critical resource of business, CIOs(chief information officers)' managerial roles become more important. CIOs work out the organization and information system strategies, introduce changes into organizations, communicate with chief executive officers and users, and take the responsibilities of the information system operation. The CIOs' managerial roles make affects on the information system performance and the organizational effectiveness. They are divided into six sub-roles; leader, liaison, entrepreneur, monitor, resource allocator and spokesman. The CIOs' influences on organizations are evaluated by information systems performance. User information satisfaction is one of the most valid information system evaluation criterions. User participation and user involvement are regarded as the antecedents of user satisfaction. This study investigates the effect of CIOs' managerial roles on user satisfaction, user participation, user involvement, CIOs' six managerial roles do not equally influence users. The results of this study have implications for the CIOs' managerial roles in organizations. As CIOs effectively perform managerial roles, user satisfaction is improved.

  • PDF

Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment

  • Lee, Sung-Hoon;Roh, Jong-hyuk;Kim, SooHyung;Jin, Seung-Hun
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.523-538
    • /
    • 2018
  • Keystroke dynamics user authentication is a behavior-based authentication method which analyzes patterns in how a user enters passwords and PINs to authenticate the user. Even if a password or PIN is revealed to another user, it analyzes the input pattern to authenticate the user; hence, it can compensate for the drawbacks of knowledge-based (what you know) authentication. However, users' input patterns are not always fixed, and each user's touch method is different. Therefore, there are limitations to extracting the same features for all users to create a user's pattern and perform authentication. In this study, we perform experiments to examine the changes in user authentication performance when using feature vectors customized for each user versus using all features. User customized features show a mean improvement of over 6% in error equal rate, as compared to when all features are used.

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.

A study on the user modeling for user friendly system (이용자편의 시스팀의 이용자모델링)

  • 신성철
    • Journal of Korean Library and Information Science Society
    • /
    • v.16
    • /
    • pp.129-157
    • /
    • 1989
  • Through this study, some considerations to be taken into account in order to construct the user model for the user friendly system which can provide each individuals user armed with varied intellectual level with the relevant information, can be summarized as follows : (1) The user' ability to use the system and users' subject knowledge, the distribution of the users' level knowledge should be considered for the decision of the typed of interaction between the users and the system. (2) the knowledge of the user models should include the following kinds of knowledge inharmony with one another, 1. Standard user knowledge which represents a general characteristic of user group, 2. individual user knowledge which represents an individual's unique characteristic, 3. Long-term user knowledge which represents the education level and subject background of users, 4. short-term user knowledge which represents the purpose of information science and information need by users (3) As knowledge generation technique, both the implicit method and explicit method should be a n.0, pplied, observation of the system during the interaction, and explicit method generates the knowledge by the user's answering the questions already made by the system. (4) The frame technique as the knowledge representation for the user-modelling in which user-knowledge is represented in a limited situation and in a qualitative aspects, can be recommended. The frame is adequated for the explanation of structured situation, and for the processing the present situation by inferring the previous experiences.

  • PDF

A Study on the User Experience Factors for The Knowledge and Information Resource System (지식정보자원시스템의 이용자 경험요인에 관한 연구)

  • Chun, Jung Hyun;Lee, Jee Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.2
    • /
    • pp.353-379
    • /
    • 2020
  • This study developed a user experience factors for the evaluation of knowledge and information resource system from the user experience perspectives, which is emerging as a new analysis standard in the field of information media and information service research. Based on the analysis criteria selected through literature analysis, 'system perception factor' and 'user experience factor' were derived as factors influencing the use of information systems through an experimental study based on the user experience sampling method. As a result, the user experience factors of final knowledge and information resource system includes nine user experience factors, 55 detailed user experience factors, and 138 system perception factors. This study is significant in that the abstract concept 'user experience' was derived and presented as a practical, concrete, measurable factor through experiments. The derived user experience factors should serve as a basis for measuring user experience perceived by users of the knowledge and information resource system.

A Robust Mutual Authentication between User Devices and Relaying Server(FIDO Server) using Certificate Authority in FIDO Environments

  • Han, Seungjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.63-68
    • /
    • 2016
  • Recently, Biometrics is being magnified than ID or password about user authentication. However, unlike a PIN, password, and personal information there is no way to modify the exposure if it is exposed and used illegally. As FIDO(Fast IDentity Online) than existing server storing method, It stores a user's biometric information to the user device. And the user device authentication using the user's biometric information, the user equipment has been used a method to notify only the authentication result to the server FIDO. However, FIDO has no mutual authentication between the user device and the FIDO server. We use a Certificate Authority in order to mutually authenticate the user and the FIDO server. Thereby, we propose a more reliable method and compared this paper with existed methods about security analysis.

User Clustering Scheme for Downlink of NOMA System

  • Li, Li;Feng, Zhenghui;Tang, Yanzhi;Peng, Zhangjie;Wang, Lisen;Shao, Weilu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1363-1376
    • /
    • 2020
  • An improved clustering scheme based on user group is proposed. Every two users are grouped among N-users in the allowed system according to their link gain from large to small. Each user group is numbered sequentially. Two user clusters are obtained according to the principle of maximizing link gain difference for the users in the first and last user groups. The remaining user groups are added to the two existing user clusters according to the parity of the group number. The clustering should be clustered again among the users in either user cluster if the throughput summation of a user cluster in NOMA is less than that of these users in orthogonal multiple access. The simulation results show that the proposed clustering scheme can increase the system throughput by about 8% compared with the hybrid clustering scheme when the number of users requiring service is 12.