• Title/Summary/Keyword: online access website

Search Result 21, Processing Time 0.023 seconds

Mining Association Rules from the Web Access Log of an Online News website (온라인 뉴스 웹사이트의 로그를 이용한 연관규칙 발견에 관한 연구)

  • Hwang, Hyunseok;Yoo, Keedong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.2
    • /
    • pp.47-57
    • /
    • 2013
  • Today a lot of functional areas of a firm are operated on the Web. Online shopping malls analyze web log recording customers' activities on the web to connect them to business outcomes. Not only commercial websites, but online news sites also need to collect and analyze web logs to understand their news readers' interest. However, little research has been performed yet. In this research we mined the web access log of an online news website and conduct Market Basket Analysis to uncover the association rules among the categories of news articles. The research is composed of two stages: 1) Identifying the individual session of a visitor; 2) Mining association rule from news articles read by each session. We gather 7-day access logs two times. The results of log mining and meanings of association rules are suggested with managerial implications in conclusion section.

Introduction to Online Based Trauma-Focused Cognitive Behavioral Therapy Education Program for Helping Sexually Abused People (성폭력피해자를 돕기 위한 온라인 기반 외상-초점 인지행동치료 교육프로그램에 대한 소개)

  • Cho, Young-Sung;Song, Jiyoun;Lee, Jun-Young
    • Anxiety and mood
    • /
    • v.12 no.2
    • /
    • pp.79-85
    • /
    • 2016
  • Sexually abused victims suffer not only physical damage, but they may also experience an array of additional problems ranging from acute fear, depressed mood, anxiety, shame, or insomnia to long-term psychiatric disorders. Trauma Focused Cognitive Behavioral Therapy (TF-CBT) is known to have excellent therapeutic effects for trauma victims including victims of sexual violence. CBT treatment includes stress immunity training, relaxation training, and acceptance and commitment therapy. In foreign countries TF-CBT is carried out online in order to increase the therapeutic accessibility for the victim and improve the quality of the interview for the therapists. As a result, those victims who have difficulties in requesting external help, who live in remote areas, or who have limited time may now have access to the service and benefit from the online education programs. A website providing an online based TF-CBT program was initiated in Korea also. Through the website, victims and their guardians may obtain therapeutic information without the need for face-to-face meetings with therapists. Our goal is to create a system with this website which will provide therapeutic assistance to sexual violence victims and improve the quality of the counseling provided by the therapist.

  • PDF

A Study on Security Factors on Online Shopping - focus on internet bookshops -

  • Hua, Deng;Kim, Chang-Eun
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2005.11a
    • /
    • pp.418-422
    • /
    • 2005
  • Electronic commerce has provided another access for consumers to purchase products, but some researches have pointed out that there are difficulties for companies to do business on web. For lack of trust, many people not prefer purchasing through virtual channels. Based on the literature review, this study aims at empirically testing the impact of website design on individual trust in internet firms. From statistic analysis, we will conclude that security, interaction, and navigation functionality will affect on-line trust.

  • PDF

Machine Learning for Flood Prediction in Indonesia: Providing Online Access for Disaster Management Control

  • Reta L. Puspasari;Daeung Yoon;Hyun Kim;Kyoung-Woong Kim
    • Economic and Environmental Geology
    • /
    • v.56 no.1
    • /
    • pp.65-73
    • /
    • 2023
  • As one of the most vulnerable countries to floods, there should be an increased necessity for accurate and reliable flood forecasting in Indonesia. Therefore, a new prediction model using a machine learning algorithm is proposed to provide daily flood prediction in Indonesia. Data crawling was conducted to obtain daily rainfall, streamflow, land cover, and flood data from 2008 to 2021. The model was built using a Random Forest (RF) algorithm for classification to predict future floods by inputting three days of rainfall rate, forest ratio, and stream flow. The accuracy, specificity, precision, recall, and F1-score on the test dataset using the RF algorithm are approximately 94.93%, 68.24%, 94.34%, 99.97%, and 97.08%, respectively. Moreover, the AUC (Area Under the Curve) of the ROC (Receiver Operating Characteristics) curve results in 71%. The objective of this research is providing a model that predicts flood events accurately in Indonesian regions 3 months prior the day of flood. As a trial, we used the month of June 2022 and the model predicted the flood events accurately. The result of prediction is then published to the website as a warning system as a form of flood mitigation.

A Conjoint Analysis of Online Information Privacy Concerns: A case in Korea (온라인 프라이버시 침해 우려에 관한 컨조인트 분석 : 한국에서의 사례)

  • Choi, Mi-Young;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.45-65
    • /
    • 2008
  • The rapid growth of the Internet has increased the amount of transmission of personally identifiable information. At the same time, with new Internet related technologies, organizations are trying to collect and access more personal information than before, which in turn makes individuals concern more about their information privacy. For their successful businesses, organizations have tried to alleviate these concerns in two ways: (1) by offering privacy policies that promise certain level of privacy protection; (2) by offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information processing theory of motivation. This paper follows Hann et al.(2007)'s methods to analyze Internet users privacy concerns in Korea and tries to compare the findings. Our research objectives are as follows: First, we analyze privacy concern mitigation strategies in the framework of the expectancy theory of motivation. Subsequently, we show how the expectancy theory based framework is linked o the conjoint analysis. We empirically validate the predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. In order to accommodate real-life contexts, we investigate these means in trade-off situation, where an organization may only be able to offer partially complete privacy protection and/or promotions and/or convenience, While privacy protection (secondary use, improper access) are associated with positive valences, we also find that financial gains can significantly increase the individuals' motivational score of a website in Korea. One important implication of this empirical analysis is that organizations may possess means to actively manage the privacy concerns of Internet users. Our findings show that privacy policies are valued by users in Korea just as in the US or Singapore. Hence, organizations can capitalize on this, by stating their privacy policy more prominently. Also organizations would better think of strategies or means that may increase online users' willingness to provide personal information. Since financial incentives also significantly increase the individuals' motivational score of website participation, we can quantify the value of website privacy protection in terms of monetary gains. We find that Korean Internet users value the total privacy protection (protection against errors, improper access, and secondary use of personal information) as worthy as KW 25,550, which is about US 28. Having done this conjoint analysis, we next adopt cluster analysis methodology. We identify two distinct segments of Korea's internet users-privacy guardians and information sellers, and convenience seekers. The immediate implication of our study is that firms with online presence must differentiate their services to serve these distinct segments to best meet the needs of segments with differing trade-offs between money and privacy concerns. Information sellers are distinguished from privacy guardians by prior experience of information provision, To the extent that businesses cannot observe an individual's prior experience, they must use indirect methods to induce segmentation by self-selection as suggested in classic economics literature of price discrimination, Businesses could use monetary rewards to attract information sellers to provide personal information. One step forward from the societal trends that emphasize the need of legal protection of information privacy, our study wants to encourage organizations and related authorities to have the viewpoints to consider both importance of privacy protection and the necessity of information trade for the growth of e-commerce.

Enhancing Privacy Protection in Steppy Applications through Pseudonymization

  • Nugroho, Heri Arum;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.763-766
    • /
    • 2015
  • Smart Healthcare System as an Open Platform (Shesop) is an integrated healthcare system and have several features, one of them is Steppy Application. Steppy does count your step and display on Shesop website. In this system security issues are not properly addressed, while Personal Health Record (PHR) patient stored in the cloud platform could be at risk. In fact, the huge electronic information available online, people needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed on the Shesop website, so that anyone who access could not tamper without permission. Recently Xu et al. showed a pseudonym scheme using smart card as a solution in e-health systems which uses discrete logarithm problem with cyclic group. In this paper, we adopt their scheme and use it application into smartphone using Near Field Communication (NFC) to construct security in Steppy apps.

A Study on the Usage Behavior of Public Library Website through an Analysis of Web Traffic (웹 트래픽 분석을 통한 공공도서관 웹사이트 이용행태에 관한 연구)

  • Kang, Munsil;Kim, Seonghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.4
    • /
    • pp.189-212
    • /
    • 2021
  • The purpose of this study is to analyze an usage behavior for the public library website through web traffic. For this purpose, using Google Analytics and growth hacking technique, the data of A public library website log was analyzed for three months from August 1, 2021 to October 31, 2021. As a result of the study, the young age group of 18-24 years old and 25-34 years old recorded a high rate of new member registration, & it was found that the inflow rate through SNS was high for external inflows. As a result of analysis for the access rate by time, it was found that the time with the highest inflow rate was between 10 am and 11 am both on Wednesday and Friday. As a access channel, the access rate using mobile (64.90%) was quite high, but at the same time, the bounce rate (27.20%) was higher than the average (24.93%), & the rate of duration time (4 minutes 33 seconds) was lower than thee average (5 minutes 22 seconds). Finally, it was found that the utilization rate of reading program events and online book curation service, which the library focuses on producing and promoting, is very low. These research results can be used as basic data for future improvement of public library websites.

A Study on the Improvement of Web Archive OASIS (웹 아카이브 OASIS 개선방안에 관한 연구)

  • Nam, Jae-Woo;Lee, Su-Young
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.2
    • /
    • pp.1-9
    • /
    • 2021
  • OASIS(Online Archiving & Searching Internet Sources) is a web archiving project of the National Library of Korea started in 2004 to systematically collect, manage, and preserve online digital information resources. In this study, the following problems were derived by analyzing the access log of the OASIS website and conducting a user survey. First, people's awareness of the OASIS project was very low, and there were many first-time visitors to the website. Second, active promotion and service reorganization to improve the use of OASIS was insufficient. The study suggested that the improvement point of this was to strengthen its own direct promotion and indirect promotion in connection with other agencies. In addition, it was proposed to enhance the service through user-customized services and to reinforce content that induces interest and fun.

Weblog Analysis of University Admissions Website using Google Analytics (구글 애널리틱스를 활용한 대학 입시 홈페이지 웹로그 분석)

  • Su-Hyun Ahn;Sang-Jun Lee
    • Journal of Practical Engineering Education
    • /
    • v.16 no.1_spc
    • /
    • pp.95-103
    • /
    • 2024
  • With the rapid decline of the school-age population, the competition for admissions has increased and marketing through digital channels has become more important, so universities are investing more resources in online promotion and communication to recruit new students. This study uses Google Analytics, a web log analysis tool, to track the visitor behavior of a university admissions website and establish a digital marketing strategy based on it. The analysis period was set from July 1, 2023, when Google Analytics 4(GA4) was integrated, to January 10, 2024, when the college admissions process was completed. The analysis revealed interesting patterns such as geographical information based on visitors' access location, devices(operating systems) and browsers used by visitors, acquisition channels through visitors traffic, conversions on pages and screens that visitors engaged with and visitor flow. Based on this study, we expect universities to find ways to strengthen their admission promotion through digital marketing and effectively communicate with applicants to gain a competitive edge.

Improving Device-to-Device Connectivity with Responsive Web Technology

  • Park, Minsoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.25-30
    • /
    • 2022
  • Since Tim Berners-Lee introduced the idea of the web to the world in the late 1980s, the way information is produced, accessed and used has been constantly changing. This was once again an era of upheaval after Apple's Steve Jobs introduced the smartphone to the world in the mid-2000s. Before the advent of smart devices, web browsing was mainly done using desktops. After the advent of this device, the era of solving almost all human needs with a small PC in the palm of your hand has arrived. The necessity of seamless connectivity between devices, which are constantly emerging and evolving, asks our attention more than ever. In this study, we will discuss a case of design and development of a national open access website, which is optimized for dynamic online user behaviors with diverse devices. Our goal is to provide one true web for people to use in their environment. Device makers need to provide products identical to the desktop environment as much as possible. Service providers should also provide services optimized for each device in hyper-connected environments. Providing a web, optimized for user's online context, will eventually result in a sustainable user experience.