• Title/Summary/Keyword: information user

Search Result 18,134, Processing Time 0.047 seconds

On the trends and the problems of User Studies (User study의 추이 및 문제점에 관한 고찰)

  • 권은경
    • Journal of Korean Library and Information Science Society
    • /
    • v.11
    • /
    • pp.19-43
    • /
    • 1984
  • There are two broad classes of user studies, in terms of their purposes or a n.0, pplications. One class might be termed basic studies, in which the purpose is to create or obtain knowledge regarding information needs and uses with no particular a n.0, pplication. The second type of study might be termed a n.0, pplied. The aim of second type is preparing standards to evaluate and improve existing information systems or to design new systems. The trends of user study tend toward basic research from a n.0, pplied ones. Furthermore, not only the broad-based studies change with special setting up and subdivided studies, but also the scopes of user study vary social scientist, human scientist, and even common users from limited natural scientists and technologists earlier. The aims of this paper is to summarize continuously pointed problems of user studies and to survey the state of the arts by reviewing the trends of user studies. The major problems of user studies are terminology, conceptualization, and methodology. These terms are essential to this study, and very important to decide the research fields and to select a method of survey, respectively. And in order to predict the user needs, studies of 'information needs' are inevitable instead those of 'information demands' which principally studied till nowadays. On the other hand, to reduce the problems of user studies, it is needed more qualitative studies ever than before and cooperation with other areas, for example, behavioral 'science, psychology, communication science and so forth.

  • PDF

User Intention-Awareness System for Goal-oriented Context-Awareness Service

  • Lee, Jung-Eun;Yoon, Tae-Bok;Lee, Jee-Hyong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.2
    • /
    • pp.154-158
    • /
    • 2007
  • As the technology developed, the system is being developed as the structure that is adapted to the intelligent environment. Therefore, the existing situation information system couldn't provide satisfactory service to the user as it provides service only by the information which it received from the sensor. This paper analyzed the problems of the existing user intention awareness system and suggested user intention awareness system to provide a stable and efficient service that fits to the intention of the user compensating this. This paper has collected the behavior data based on the scenario of the sequential behavior course of the user that occurs at breakfast time in the kitchen which is the home domain environment thai is closely related to our lives. This scenario course also showed the flow that the goal intentional user intention awareness system acted that it suggested, and showed the sequential course processing the user behavior data by tables and charts.

A Study On User-centric Identity Information Management Model In Internet Environment (인터넷 환경에서의 사용자 중심 ID정보 관리 모델에 관한 연구)

  • Rhy, Hae-Gyu;Shin, Hyeon-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.37-50
    • /
    • 2009
  • With the increase of number of internet services due to development of internet, it becomes a critical issue to appropriately manage the personal information about user's identity, that is ID information that service providers collect in terms of user's convenience improvement and privacy protection. But the existing ID information management models are service provider-centric or they insufficiently provide ID information management functions, so that they have not been satisfying user's requirement. In this paper, by establishing user-centric concept in we information management, we propose the new user-centric ID information management model in which user can make use of the internet service more conveniently and eventually enhance user's privacy.

A Study on Emotional Information System Using User Color Information

  • Ko, Hye-Kyeong
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.82-92
    • /
    • 2019
  • The appropriate use of color and light can increase psychological stress or feelings of mental stability. As such, many people currently use color therapy, which provides relaxation and stability through color stimulation. Many people currently use color therapy, which provides relaxation and stability through color stimulation. The smartphone-based psychological color therapy system that is to be developed through the study is a method for relieving stress. This study examines a method of using smartphones to understand user's emotional information such as types of stress and to provide color therapy information regarding these emotions. The goal of this study is to use the user's smart phone to provide color therapy that employs the user's emotional information. The intelligent emotion system, which uses platforms such as mobile devices and the PC, was designed considering the user's context, and it provides the user with various data formats such as images, video, text, audio, to send results to the user. The system was developed in the form of a service-based mobile application. The study designed an emotional color therapy system that uses a smartphone to measure the user's stress and provides appropriate color therapy.

Design of User Privacy Model for Strong Reliability in SNS Environment (SNS 환경에서 신뢰성이 강한 사용자 프라이버시 모델 설계)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.237-242
    • /
    • 2013
  • SNS is emerging as an academic and social interest, as Facebook and Twitter are developed explosively. But, SNS has a problem of exposing user's privacy because it is originated by exchanging user's personal information and opinion. This paper proposes SNS user privacy protecting model using data separation and false data information instead of blocking which is using to protect user's personal privacy. The proposed model do not let the third party extract precise information after collecting user's context information by adding false information to separated context information. Also, it gets user's agreement beforehand if SNS service provider uses user's information not to be used illegally by the third party.

User Preference Prediction & Personalized Recommendation based on Item Dependency Map (IDM을 기반으로 한 사용자 프로파일 예측 및 개인화 추천 기법)

  • 염선희
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.211-214
    • /
    • 2003
  • In this paper, we intend to find user's TV program choosing pattern and, recommend programs that he/she wants. So we suggest item dependency map which express relation between chosen program. Using an algorithm that we suggest, we can recommend an program, which a user has not saw yet but maybe is likely to interested in. Item dependency map is used as patterns for association in hopfield network so we can extract users global program choosing pattern only using users partial information. Hopfield network can extract global information from sub-information. Our algorithm can predict user's inclination and recommend an user necessary information.

  • PDF

An Analysis of the Research Trend on The Information User studies (이용자 연구에 관한 연구동향 분석)

  • Hahn Bock Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.23
    • /
    • pp.107-125
    • /
    • 1992
  • The purpose of this study is to investigate the research trend of information user studies. The following findings are made. The literature on information user studies during 1980-1990 reveals 120 titles. The faculty members of university tend to publish their results in scientific journals and university publication while non-faculty members are more likely to represent their research papers in unpublished master thesis and bulletin. Subject distribution of research were classified into ten: user studies, material use studies, information needs and uses, user education, library use pattern, citation analysis, journal use, catalog use, information system, non-use study. Survey research, literature research, survey reserch and literature research use jointly, experimental research and citation analysis were employed for information user studies.

  • PDF

PC User Authentication using Hand Gesture Recognition and Challenge-Response

  • Shin, Sang-Min;Kim, Minsoo
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.8 no.2
    • /
    • pp.79-87
    • /
    • 2018
  • The current PC user authentication uses character password based on user's knowledge. However, this can easily be exploited by password cracking or key-logging programs. In addition, the use of a difficult password and the periodic change of the password make it easy for the user to mistake exposing the password around the PC because it is difficult for the user to remember the password. In order to overcome this, we propose user gesture recognition and challenge-response authentication. We apply user's hand gesture instead of character password. In the challenge-response method, authentication is performed in the form of responding to a quiz, rather than using the same password every time. To apply the hand gesture to challenge-response authentication, the gesture is recognized and symbolized to be used in the quiz response. So we show that this method can be applied to PC user authentication.

An Analysis Method of User Preference by using Web Usage Data in User Device (사용자 기기에서 이용한 웹 데이터 분석을 통한 사용자 취향 분석 방법)

  • Lee, Seung-Hwa;Choi, Hyoung-Kee;Lee, Eun-Seok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.3
    • /
    • pp.189-199
    • /
    • 2009
  • The amount of information on the Web is explosively growing as the Internet gains in popularity. However, only a small portion of the information on the Web is truly relevant or useful to the user. Thus, offering suitable information according to user demand is an important subject in information retrieval. In e-commerce, the recommender system is essential to revitalize commercial transactions, raise user satisfaction and loyalty towards the information provider. The existing recommender systems are mostly based on user data collected at servers, so user data are dispersed over several servers. Therefore, web servers that lack sufficient user behavior data cannot easily infer user preferences. Also, if the user visits the server infrequently, it may be hard to reflect the dynamically changing user's interest. This paper proposes a novel personalization system analyzing the user preference based on web documents that are accessed by the user on a user device. The system also identifies non-content blocks appearing repeatedly in the dynamically generated web documents, and adds weight to the keywords extracted from the hyperlink sentence selected by the user. Therefore, the system establishes at an early stage recommendation strategies for the web server that has little user data. Also, user profiles are generated rapidly and more accurately by identifying the information blocks. In order to evaluate the proposed system, this study collected web data and purchase history from users who have current purchase activity. Then, we computed the similarity between purchase data and the user profile. We confirm the accuracy of the generated user profile since the web page containing the purchased item has higher correlation than other item pages.

Ensuring Anonymity for LBSs in Smartphone Environment

  • Alzaabi, Mohammed;Yeun, Chan-Yeob;Martin, Thomas Anthony
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.121-136
    • /
    • 2011
  • With the rapid growth of GPS-enable Smartphones, the interest on using Location Based Services (LBSs) has increased significantly. The evolution in the functionalities provided by those smartphones has enabled them to accurately pinpoint the location of a user. Because location information is what all LBSs depend on to process user's request, it should be properly protected from attackers or malicious service providers (SP). Additionally, maintaining user's privacy and confidentiality are imperative challenges to be overcome. A possible solution for these challenges is to provide user anonymity, which means to ensure that a user initiating a request to the SP should be indistinguishable from a group of people by any adversary who had access to the request. Most of the proposals that maintain user's anonymity are based on location obfuscation. It mainly focuses on adjusting the resolution of the user's location information. In this paper, we present a new protocol that is focused on using cryptographic techniques to provide anonymity for LBSs users in the smartphone environment. This protocol makes use of a trusted third party called the Anonymity Server (AS) that ensures anonymous communication between the user and the service provider.