• Title/Summary/Keyword: user' behavior

Search Result 1,746, Processing Time 0.027 seconds

A Modeling Methodology for Analysis of Dynamic Systems Using Heuristic Search and Design of Interface for CRM (휴리스틱 탐색을 통한 동적시스템 분석을 위한 모델링 방법과 CRM 위한 인터페이스 설계)

  • Jeon, Jin-Ho;Lee, Gye-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.179-187
    • /
    • 2009
  • Most real world systems contain a series of dynamic and complex phenomena. One of common methods to understand these systems is to build a model and analyze the behavior of them. A two-step methodology comprised of clustering and then model creation is proposed for the analysis on time series data. An interface is designed for CRM(Customer Relationship Management) that provides user with 1:1 customized information using system modeling. It was confirmed from experiments that better clustering would be derived from model based approach than similarity based one. Clustering is followed by model creation over the clustered groups, by which future direction of time series data movement could be predicted. The effectiveness of the method was validated by checking how similarly predicted values from the models move together with real data such as stock prices.

Ethics-Literacy Curriculum Modeling for Ethical Practice of 5G Information Professionals (5G 정보환경 정보전문가를 위한 윤리 리터러시 교육과정 모형연구)

  • Yoo, Sarah
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.139-166
    • /
    • 2022
  • Ethical Issues increase when people engage in smart technological systems such as 5G, IoT, Cloud computing services and AI applications. Range of this research is comparison of various literacy concepts and its ethical issues in considering of 5G features and UX. 86 research papers and reports which have been published within the recent 5 years (2017-2022), relating the research subject, are investigated and analyzed. Two results show that various literacies can be grouped into four areas and that some of common issues among those areas as well as unique issues of each area are identified. Based on the literature analysis, an Operational Definition of Ethics-Literacy is presented and the model of ethics-literacy curriculum supporting ethical behavior of 5G information professionals is developed and suggested.

A Study on the Social Implications of Data Literacy for the Post-pandemic Era and the Direction of Library Services (포스트 팬데믹 시대 데이터 리터러시의 사회적 함의와 도서관 서비스 방향에 대한 연구)

  • Lee, Jeong-Mee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.1
    • /
    • pp.365-386
    • /
    • 2022
  • The purpose of this study is to understand the changes in human information behavior brought about by the pandemic situation. This study also examines the social context of data literacy as lifelong education. In addition, it was attempted to understand the changed environment and propose library services in the post-pandemic era based on predicted trends. In order to do this, two phenomena that are currently striking our society, datafication and the pandemic, were reviewed in general, and studies related to library information services in response to the pandemic were examined. Based on this, the social meaning of data literacy in the pandemic era was reconfirmed and the environmental changes faced by libraries were examined based on 20 trends suggested by IFLA. Through this process, the study was concluded by suggesting the implementation of data literacy and the direction of library services.

The influence of evaluation factors of overseas direct sales website on the continuous intention of Chinese consumers (대(對)중국 역직구사이트 평가요인이 지속적 이용의도에 미치는 영향)

  • Son, Je-Young;Kang, In-Won
    • Korea Trade Review
    • /
    • v.43 no.3
    • /
    • pp.219-243
    • /
    • 2018
  • This study focused on the rapidly growing Chinese market by developing an evaluation model for overseas direct sales websites for Chinese consumers. In addition, we developed specific strategic alternatives for each sub-market by conducting multi-group analysis for each consumer's characteristics. Results showed that the level of concern about site use had a stronger impact on persistent use behavior. In addition, among antecedents that affect the level of assurance and concern, we found that these includes not only the perceived benefits and perceived risk factors identified in previous studies but also social-cultural factors. In addition, this study compares the evaluation of overseas direct sales website according to the level of involvement of users. This study analyzes the differences in coefficients among the paths and suggest practical implications for each group.

  • PDF

A Study on Service Design of Public transportation for Transportation Vulnerable - Focused on elderly and Foreigner - (교통약자를 고려한 대중교통 서비스 디자인 연구 - 고령자 및 외국인 중심으로 -)

  • Lee, Seung Min;Pan, Young Hwan;Song, In ho
    • Design Convergence Study
    • /
    • v.15 no.2
    • /
    • pp.223-236
    • /
    • 2016
  • The infrastructure of public transportation of Seoul which has been developed in parallel with the progress of modernization receives successful performance evaluation at home and abroad, currently representing the highest transport distribution ratio. In spite of this fact, the public transportation of Seoul, which has entered into advanced phase of services, still leaves much to be desired, in particular, the mobility considering the transportation vulnerable is not well assured. It is time to provide proper supports for the efficient mobility of public transportation in accordance with the social changes present in the aging and multicultural society. This study inquired about the current status of public transportation and that of its users. In addition, the main inquiry target was oriented to the elderly and foreigners for observation and investigation, as well as for the analysis of their behavior. Furthermore, through in-depth interviews, inconvenient factors have been found according to public transportation means and its usage phase, by carrying out detailed evaluations of public transportation services. Based on this, the enhancement elements were defined and the corresponding concept was designed through a series of idea workshops, and this study intended to contribute to improving future public transportation services by proposing the improvement scheme applicable to the upcoming public transportation.

Study on Methodology of Collecting Realtime File Access Event Information (실시간 파일 접근 이벤트 정보 수집 방법에 관한 연구)

  • Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.447-448
    • /
    • 2021
  • The boundary-based security architecture has the advantage of easy deployment of security solutions and high operational efficiency. The boundary-based security architecture is easy to detect and block externally occurring security threats, but is inappropriate to block internally occurring security threats. Unfortunately, internal security threats are increasing in frequency. In order to solve this problem, a zero trust model has been proposed. The zero trust model requires a real-time monitoring function to analyze the behavior of a subject accessing various information resources. However, there is a limit to real-time monitoring of file access of a subject confirmed to be trusted in the system. Accordingly, this study proposes a method to monitor user's file access in real time. To verify the effectiveness of the proposed monitoring method, the target function was verified after the demonstration implementation. As a result, it was confirmed that the method proposed in this study can monitor access to files in real time.

  • PDF

Study on The Data Decryption and Artifacts Analysis of KakaoTalk in Windows Environment (윈도우 환경에서 카카오톡 데이터 복호화 및 아티팩트 분석 연구)

  • Minuook Jo;Nam Su Chang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.51-61
    • /
    • 2023
  • Messengers such as KakaoTalk, LINE, and Facebook Messenger are universal means of communication used by anyone. As the convenience functions provided to users and their usage time increase, so does the user behavior information remaining in the artifacts, which is being used as important evidence from the perspective of digital forensic investigation. However, for security reasons, most of the data is currently stored encrypted. In addition, cover-up behaviors such as intentional manipulation, concealment, and deletion are increasing, causing the problem of delaying digital forensic analysis time. In this paper, we conducted a study on the data decryption and artifacts analysis in a Windows environment for KakaoTalk, the messenger with the largest number of users in Korea. An efficient way of obtaining a decryption key and a method of identifying and decrypting messages attempted to be deleted are presented, and thumbnail artifacts are analyzed.

Detecting suspicious branch statements through recording and analyzing execution logs of apps using reflection (리플렉션이 사용된 앱의 실행 로그 기록 및 분석을 통한 의심스러운 분기문 탐지)

  • Sumin Lee;Minho Park;Jiman Hong
    • Smart Media Journal
    • /
    • v.12 no.5
    • /
    • pp.58-64
    • /
    • 2023
  • In Logic Bomb, the conditions of branch statements that trigger malicious behavior cannot be detected in advance, making Android malicious app analysis difficult. Various studies have been conducted to detect potentially suspicious branch statements that can be logic bombs and triggers, but suspicious branch statements cannot be properly detected in apps that contain information determined at runtime, such as reflection. In this paper, we propose a tool that can detect suspicious branch statements even when reflection is used in Android apps. It works through recording app execution logs and analyzing the recorded log). The proposed tool can check the relationship between the called method and the branch statement by recording and analyzing the user-defined methods, Java APIs called and method information called through reflection, and branch information in the log while the Android app is running. Experimental results show that suspicious branch statements can be detected even in apps where reflection is used.

A vibration-based approach for detecting arch dam damage using RBF neural networks and Jaya algorithms

  • Ali Zar;Zahoor Hussain;Muhammad Akbar;Bassam A. Tayeh;Zhibin Lin
    • Smart Structures and Systems
    • /
    • v.32 no.5
    • /
    • pp.319-338
    • /
    • 2023
  • The study presents a new hybrid data-driven method by combining radial basis functions neural networks (RBF-NN) with the Jaya algorithm (JA) to provide effective structural health monitoring of arch dams. The novelty of this approach lies in that only one user-defined parameter is required and thus can increase its effectiveness and efficiency, as compared to other machine learning techniques that often require processing a large amount of training and testing model parameters and hyper-parameters, with high time-consuming. This approach seeks rapid damage detection in arch dams under dynamic conditions, to prevent potential disasters, by utilizing the RBF-NNN to seamlessly integrate the dynamic elastic modulus (DEM) and modal parameters (such as natural frequency and mode shape) as damage indicators. To determine the dynamic characteristics of the arch dam, the JA sequentially optimizes an objective function rooted in vibration-based data sets. Two case studies of hyperbolic concrete arch dams were carefully designed using finite element simulation to demonstrate the effectiveness of the RBF-NN model, in conjunction with the Jaya algorithm. The testing results demonstrated that the proposed methods could exhibit significant computational time-savings, while effectively detecting damage in arch dam structures with complex nonlinearities. Furthermore, despite training data contaminated with a high level of noise, the RBF-NN and JA fusion remained the robustness, with high accuracy.

Coercive Marketing Stimuli and Negative Consequence: Comparative Study of Chinese and Korean Social Media (강압적 마케팅 자극이 미치는 부정적 영향: 중국과 한국 소셜 미디어 비교 연구)

  • In-won Kang;Jae-won Heo
    • Korea Trade Review
    • /
    • v.48 no.1
    • /
    • pp.287-306
    • /
    • 2023
  • This study tries to explore that the relationship between social media company's coercive and involuntary marketing stimuli and the negative consequences that have not been intensively discussed in measuring the performance of social media companies. To reflect the influence of the socio-cultural environment of country, a comparative study was conducted on major social media market in Korea and China. As result of the verification, it was found that coercive marketing stimuli had influence on social media firm's negative consequences. And there are significant differences by country in the effect of company's coercive marketing stimulus on user attitudes and negative performance. The results of this study are expected to provide practical implications for the operation of social media firms and individuals who want to do business using social media.