• 제목/요약/키워드: information user

검색결과 18,134건 처리시간 0.044초

User attribute verification method using user mobile dynamic information

  • Kim, Seok-Hun
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권1호
    • /
    • pp.145-149
    • /
    • 2019
  • Various supplementary authentication methods are used to supplement user authentication and authorization provided by existing password verification online1. In recent years, authentication and authorization methods using user attribute information have been studied and utilized in various services. User attribute information can be divided into static information and dynamic information. The existing methods focus on research to identify users using dynamic information or to generate challenge questions for user reauthentication. Static information such as a user's home address, school, company, etc. is associated with dynamic information such as location information. We propose a method to verify user attribute information by using the association between two attribute information. For this purpose, the static information of the user is verified by using the user's location record which is dynamic information. The experiment of this paper collects the dynamic information of the actual user and extracts the static information to verify the user attributes. And we implemented the user attribute information authentication system using the proposal verification method and evaluated the utility based on applicability, convenience, and security.

A Study of user-centric service model and user satisfaction analysis for information service

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of information and communication convergence engineering
    • /
    • 제7권2호
    • /
    • pp.92-97
    • /
    • 2009
  • Lately, influence of information rises and interest about satisfaction estimation of information providing service is risin. According to rapid change in information environment, information-providing service is being changed in various form, in which center development is made in relation to the effort for customer satisfaction intended to enhance user's satisfaction level through providing more convenient and higher service centered on information service user rather than information service provider. Organizations providing information service is also changing their service from traditional one centered on service provider to that for user's satisfaction and service quality, and evaluation of information service quality and measurement of user's satisfaction as the result of using information service are regarded important. In this respect, it is needed to measure user's satisfaction level for environmental factors of information service and analyze what kind of influence they have to enhance user's satisfaction level of information service. Also function and efficiency of information offer service are important. Therefore, interest for satisfaction survey to heighten contents satisfaction of information-providing service, service satisfaction, satisfaction of user of system satisfaction is increased. In this paper, we propose a model of the user satisfaction index for information-providing services and present the user satisfaction index is measured to the model. Also we this study suggest qualitative improvements of information-providing service required for change to user-centric information-providing service through measuring user satisfaction index of ITFIND system and schemes to improve information quality

User Reputation computation Method Based on Implicit Ratings on Social Media

  • Bok, Kyoungsoo;Yun, Jinkyung;Kim, Yeonwoo;Lim, Jongtae;Yoo, Jaesoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권3호
    • /
    • pp.1570-1594
    • /
    • 2017
  • Social network services have recently changed from environments for simply building connections among users to open platforms for generating and sharing various forms of information. Existing user reputation computation methods are inadequate for determining the trust in users on social media where explicit ratings are rare, because they determine the trust in users based on user profile, explicit relations, and explicit ratings. To solve this limitation of previous research, we propose a user reputation computation method suitable for the social media environment by incorporating implicit as well as explicit ratings. Reliable user reputation is estimated by identifying malicious information raters, modifying explicit ratings, and applying them to user reputation scores. The proposed method incorporates implicit ratings into user reputation estimation by differentiating positive and negative implicit ratings. Moreover, the method generates user reputation scores for individual categories to determine a given user's expertise, and incorporates the number of users who participated in rating to determine a given user's influence. This allows reputation scores to be generated also for users who have received no explicit ratings, and, thereby, is more suitable for social media. In addition, based on the user reputation scores, malicious information providers can be identified.

정보담당 최고임원 (CIO)의 경영자 역할이 사용자에 미치는 직접적 영향에 관한 연구 (A Study on the Effects of CIOs' Managerial Roles on Users)

  • 이재범;안상협
    • Asia pacific journal of information systems
    • /
    • 제7권3호
    • /
    • pp.125-143
    • /
    • 1997
  • As information is the critical resource of business, CIOs(chief information officers)' managerial roles become more important. CIOs work out the organization and information system strategies, introduce changes into organizations, communicate with chief executive officers and users, and take the responsibilities of the information system operation. The CIOs' managerial roles make affects on the information system performance and the organizational effectiveness. They are divided into six sub-roles; leader, liaison, entrepreneur, monitor, resource allocator and spokesman. The CIOs' influences on organizations are evaluated by information systems performance. User information satisfaction is one of the most valid information system evaluation criterions. User participation and user involvement are regarded as the antecedents of user satisfaction. This study investigates the effect of CIOs' managerial roles on user satisfaction, user participation, user involvement, CIOs' six managerial roles do not equally influence users. The results of this study have implications for the CIOs' managerial roles in organizations. As CIOs effectively perform managerial roles, user satisfaction is improved.

  • PDF

Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment

  • Lee, Sung-Hoon;Roh, Jong-hyuk;Kim, SooHyung;Jin, Seung-Hun
    • Journal of Information Processing Systems
    • /
    • 제14권2호
    • /
    • pp.523-538
    • /
    • 2018
  • Keystroke dynamics user authentication is a behavior-based authentication method which analyzes patterns in how a user enters passwords and PINs to authenticate the user. Even if a password or PIN is revealed to another user, it analyzes the input pattern to authenticate the user; hence, it can compensate for the drawbacks of knowledge-based (what you know) authentication. However, users' input patterns are not always fixed, and each user's touch method is different. Therefore, there are limitations to extracting the same features for all users to create a user's pattern and perform authentication. In this study, we perform experiments to examine the changes in user authentication performance when using feature vectors customized for each user versus using all features. User customized features show a mean improvement of over 6% in error equal rate, as compared to when all features are used.

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • 제6권2호
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.

이용자편의 시스팀의 이용자모델링 (A study on the user modeling for user friendly system)

  • 신성철
    • 한국도서관정보학회지
    • /
    • 제16권
    • /
    • pp.129-157
    • /
    • 1989
  • Through this study, some considerations to be taken into account in order to construct the user model for the user friendly system which can provide each individuals user armed with varied intellectual level with the relevant information, can be summarized as follows : (1) The user' ability to use the system and users' subject knowledge, the distribution of the users' level knowledge should be considered for the decision of the typed of interaction between the users and the system. (2) the knowledge of the user models should include the following kinds of knowledge inharmony with one another, 1. Standard user knowledge which represents a general characteristic of user group, 2. individual user knowledge which represents an individual's unique characteristic, 3. Long-term user knowledge which represents the education level and subject background of users, 4. short-term user knowledge which represents the purpose of information science and information need by users (3) As knowledge generation technique, both the implicit method and explicit method should be a n.0, pplied, observation of the system during the interaction, and explicit method generates the knowledge by the user's answering the questions already made by the system. (4) The frame technique as the knowledge representation for the user-modelling in which user-knowledge is represented in a limited situation and in a qualitative aspects, can be recommended. The frame is adequated for the explanation of structured situation, and for the processing the present situation by inferring the previous experiences.

  • PDF

지식정보자원시스템의 이용자 경험요인에 관한 연구 (A Study on the User Experience Factors for The Knowledge and Information Resource System)

  • 전정현;이지연
    • 정보관리학회지
    • /
    • 제37권2호
    • /
    • pp.353-379
    • /
    • 2020
  • 본 연구에서는 정보매체 및 정보서비스 연구영역에서 새로운 분석기준으로 대두되고 있는 이용자 경험의 관점에서 지식정보자원시스템을 분석하기 위한 경험요인을 개발하였다. 문헌분석을 통해 선정한 분석 기준을 기반으로 이용자 경험 샘플링 방법을 적용한 실험연구를 통해 지식정보자원시스템 이용에 영향을 미치는 시스템 지각요인과 이용자 경험요인을 도출하였다. 수행결과 총 9개의 경험요인에 대한 55개의 세부 경험요인, 138개의 시스템 지각요인으로 구성된 이용자 경험요인이 도출되었다. 본 연구는 추상적 개념인 이용자 경험을 실험을 통해 실제적이고 구체적인, 측정 가능한 요인으로 도출하여 제시하였다는데 의의가 있다. 도출된 이용자 경험 요인은 지식정보자원시스템 이용자들이 지각하는 이용자 경험 정도를 측정하기 위한 기준으로 활용될 수 있을 것으로 예상한다.

A Robust Mutual Authentication between User Devices and Relaying Server(FIDO Server) using Certificate Authority in FIDO Environments

  • Han, Seungjin
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권10호
    • /
    • pp.63-68
    • /
    • 2016
  • Recently, Biometrics is being magnified than ID or password about user authentication. However, unlike a PIN, password, and personal information there is no way to modify the exposure if it is exposed and used illegally. As FIDO(Fast IDentity Online) than existing server storing method, It stores a user's biometric information to the user device. And the user device authentication using the user's biometric information, the user equipment has been used a method to notify only the authentication result to the server FIDO. However, FIDO has no mutual authentication between the user device and the FIDO server. We use a Certificate Authority in order to mutually authenticate the user and the FIDO server. Thereby, we propose a more reliable method and compared this paper with existed methods about security analysis.

User Clustering Scheme for Downlink of NOMA System

  • Li, Li;Feng, Zhenghui;Tang, Yanzhi;Peng, Zhangjie;Wang, Lisen;Shao, Weilu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권3호
    • /
    • pp.1363-1376
    • /
    • 2020
  • An improved clustering scheme based on user group is proposed. Every two users are grouped among N-users in the allowed system according to their link gain from large to small. Each user group is numbered sequentially. Two user clusters are obtained according to the principle of maximizing link gain difference for the users in the first and last user groups. The remaining user groups are added to the two existing user clusters according to the parity of the group number. The clustering should be clustered again among the users in either user cluster if the throughput summation of a user cluster in NOMA is less than that of these users in orthogonal multiple access. The simulation results show that the proposed clustering scheme can increase the system throughput by about 8% compared with the hybrid clustering scheme when the number of users requiring service is 12.