• Title/Summary/Keyword: user's activities

Search Result 491, Processing Time 0.026 seconds

A Case Study on the Planning Process of ′'A′ Kindergarten′s Playground Applied User Participatory Design (사용자 참여디자인에 의한 ′A′유치원 놀이터 계획과정에 관한 연구)

  • Choi Mock-wha;Choi Byoung-sook
    • Journal of the Korean housing association
    • /
    • v.15 no.4
    • /
    • pp.87-97
    • /
    • 2004
  • The purpose of this study is to introduce the design process for the 'natural-friendly' kindergarten playground using participatory design method. The 'A' kindergarten in Daejon was selected as a case study. The concept of the design was decided by the user's needs which draw out the pictures of children, owner's educational philosophy, and request of the teachers. As a result, the concept approached to 'our neighborhood (Korean traditional village)' image, and was planned with a focus on open space, which allows rich in natural elements(earth ground, trees, flowers vegetable farm, animals, water and sand etc.) and various play activities. And a user participatory design method proved that it was proper to design a kindergarten playground.

Real-time Intrusion-Detection Parallel System for the Prevention of Anomalous Computer Behaviours (비정상적인 컴퓨터 행위 방지를 위한 실시간 침입 탐지 병렬 시스템에 관한 연구)

  • 유은진;전문석
    • Review of KIISC
    • /
    • v.5 no.2
    • /
    • pp.32-48
    • /
    • 1995
  • Our paper describes an Intrusion Detection Parallel System(IDPS) which detects an anomaly activity corresponding to the actions that interaction between near detection events. IDES uses parallel inductive approaches regarding the problem of real-time anomaly behavior detection on rule-based system. This approach uses sequential rule that describes user's behavior and characteristics dependent on time. and that audits user's activities by using rule base as data base to store user's behavior pattern. When user's activity deviates significantly from expected behavior described in rule base. anomaly behaviors are recorded. Observed behavior is flagged as a potential intrusion if it deviates significantly from the expected behavior or if it triggers a rule in the parallel inductive system.

  • PDF

A Study on System Tracing User Activities in the Windows Operating System (윈도우 운영체제 상의 사용자 행위 추적에 관한 연구)

  • Jung, Chang-Sung;Kim, Young-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.101-114
    • /
    • 2011
  • As it seems like critical information leakages have been increasing due to industrial espionage and malicious internal users, the importance of introducing audit and log security technology is growing every now and then. In this paper, we suggest the session logging system for the company's internal control to meet the SOX legislation level, by monitoring and analyzing users behaviors connecting to the business-critical Operating System. The system proposed in this paper aims to monitor the user's illegal activities in the Operating System, and to present the clear evidence of purpose of those activities by detailed logs. For this purpose, we modified Operating System by adding multiple services suggested in this paper. These services utilize interfaces provided by the existing Operating System and add functions to control access and get logs. The system saves and manages session logs of users or administrators connected to the server with centralized log storage. And the system supports session log searching and lookup features required by SOX legislation for the company's internal controls with the level of computer forensics and logging technology.

Pre-Processing of Query Logs in Web Usage Mining

  • Abdullah, Norhaiza Ya;Husin, Husna Sarirah;Ramadhani, Herny;Nadarajan, Shanmuga Vivekanada
    • Industrial Engineering and Management Systems
    • /
    • v.11 no.1
    • /
    • pp.82-86
    • /
    • 2012
  • In For the past few years, query log data has been collected to find user's behavior in using the site. Many researches have studied on the usage of query logs to extract user's preference, recommend personalization, improve caching and pre-fetching of Web objects, build better adaptive user interfaces, and also to improve Web search for a search engine application. A query log contain data such as the client's IP address, time and date of request, the resources or page requested, status of request HTTP method used and the type of browser and operating system. A query log can offer valuable insight into web site usage. A proper compilation and interpretation of query log can provide a baseline of statistics that indicate the usage levels of website and can be used as tool to assist decision making in management activities. In this paper we want to discuss on the tasks performed of query logs in pre-processing of web usage mining. We will use query logs from an online newspaper company. The query logs will undergo pre-processing stage, in which the clickstream data is cleaned and partitioned into a set of user interactions which will represent the activities of each user during their visits to the site. The query logs will undergo essential task in pre-processing which are data cleaning and user identification.

Efficient Masquerade Detection Based on SVM (SVM 기반의 효율적인 신분위장기법 탐지)

  • 김한성;권영희;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.91-104
    • /
    • 2003
  • A masquerader is someone who pretends to be another user while invading the target user's accounts, directories, or files. The masquerade attack is the most serious computer misuse. Because, in most cases, after securing the other's password, the masquerader enters the computer system. The system such as IDS could not detect or response to the masquerader. The masquerade detection is the effort to find the masquerader automatically. This system will detect the activities of a masquerader by determining that user's activities violate a profile developed for that user with his audit data. From 1988, there are many efforts on this topic, but the success of the offers was limited and the performance was unsatisfactory. In this report we propose efficient masquerade detection system using SVM which create the user profile.

A Real-Time User Authenticating Method Using Behavior Pattern Through Web (웹 사용자의 실시간 사용 패턴 분석을 이용한 정상 사용자 판별 방법)

  • Jang, Jin-gu;Moon, Jong Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1493-1504
    • /
    • 2016
  • As cyber threats have been increased over the Internet, the invasions of personal information are constantly occurring. A malicious user can access the Web site as a normal user using leaked personal information and does illegal activities. This paper proposes an effective method which authenticates a genuine user with real-time. The method use the user's profile which is a record of user's behavior created by Membership Analysis(MA) and Markov Chain Model(MCM). In addition to, user's profile is augmented by a Time Weight(TW) which reflects the user's tendency. This method can detect a malicious user who camouflage normal user. Even if it is a genuine user, it can be determined as an abnomal user if the user acts beyond the record profile. The result of experiment showed a high accuracy, 96%, for the correct user.

A Study on the Observation Method of Interaction between Users and Products - With Emphasis on the Video Ethnography of Driver Environment - (사용자-제품 간 인터랙션의 관찰 조사 체계에 관한 연구 - 운전자 환경에서의 비디오 관찰법을 중심으로 -)

  • Kim, Gang-Min;Pan, Young-Hwan;Jeong, Ji-Hong
    • Journal of the HCI Society of Korea
    • /
    • v.4 no.2
    • /
    • pp.1-8
    • /
    • 2009
  • User-centered design aims to develop device naturally without the interference of user' s conscious and unconscious behavior. Accordingly, designers need to understand their user's requirements, observe user behavior and interaction in the real environment. However, existing observations suggested a vast range of analysis system and observation techniques which are often ambiguous to the designers. Therefore, this research is aimed to propose an observation system for collecting data from user's behavior. In order to do so, we define the components and behavior level within the context of driving.

  • PDF

Development of an EMG-Based Car Interface Using Artificial Neural Networks for the Physically Handicapped (신경망을 적용한 지체장애인을 위한 근전도 기반의 자동차 인터페이스 개발)

  • Kwak, Jae-Kyung;Jeon, Tae-Woong;Park, Hum-Yong;Kim, Sung-Jin;An, Kwang-Dek
    • Journal of Information Technology Services
    • /
    • v.7 no.2
    • /
    • pp.149-164
    • /
    • 2008
  • As the computing landscape is shifting to ubiquitous computing environments, there is increasingly growing the demand for a variety of device controls that react to user's implicit activities without excessively drawing user attentions. We developed an EMG-based car interface that enables the physically handicapped to drive a car using their functioning peripheral nerves. Our method extracts electromyogram signals caused by wrist movements from four places in the user's forearm and then infers the user's intent from the signals using multi-layered neural nets. By doing so, it makes it possible for the user to control the operation of car equipments and thus to drive the car. It also allows the user to enter inputs into the embedded computer through a user interface like an instrument LCD panel. We validated the effectiveness of our method through experimental use in a car built with the EMG-based interface.

Factors affecting the User Satisfaction and Continuance Usage Intention of Social Network Service (SNS 사용자의 개인적·사회적 특성이 지속적 사용의도에 영향을 미치는 요인 : 생활 공유형 SNS를 중심으로)

  • Kim, Byung-Gon;Yoon, Il-Ki;Park, Heung-Soon
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.2
    • /
    • pp.207-224
    • /
    • 2016
  • Investments in information and communication technologies (ICT) around the world have grown at an enormous rate over the past two decades, which reflects a new emphasis on consumer mobile devices. A social network service (SNS) is an online service that aims to build social relations among people who share interests and activities. The role of SNS is enormous for communicating ideas and opinions among social participants. The use of SNS has recently become one of the most popular social activities worldwide. This research investigated relation between personal characteristics, social characteristics and user satisfaction on SNS then, analyzed how these factors affecting continuance usage intention on SNS users. The conclusion is summarized as below. The study results show that informativeness, pleasure, innovativeness, relationship and empathy of SNS are having positive impact to some degree on the user satisfaction. Further, the user satisfaction of SNS users and quality of life have a positive impact on the continuance usage intention of SNS users. This results show that various SNS qualities are necessary to actively explore and obtain further information that users intend to find, while they are insufficient in function to provide the information other users require or exchange information with other users through the SNS.

A study on user Satisfaction of the Junior College Library based on its Characteristics of Space Composition (전문대학도서관의 공간구성 특성에 따른 이용만족도 연구)

  • Lee, Su-Young
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.24 no.6
    • /
    • pp.37-44
    • /
    • 2017
  • This study is about user satisfaction of the Junior College Library based on its characteristics of space composition. For this, we studied characteristics of space composition targeting the libraries in colleges in Seoul and Gyeonggi-do. First, in case of study of characteristics of space composition for books and library data, student satisfaction for traditional and normal library areas was high. It means that the service based on library areas should start from normal library areas as well as there is a change about space as the type of data in libraries change to electric data and multimedia. Second, If we look at the space for a reader and a user, satisfaction for a normal reading room was high. we can also see that satisfaction for a computer room and a multimedia reading room was not higher but still high. Also, the reason why satisfaction for a multimedia reading room that provides various activities was high was that the complex of a library space is needed to provide users with various activities. Third, in case of space for programme function and meeting, satisfaction for the room of video information and the group study room was high. we can see that user satisfaction for the space got high basically when a user is satisfied with the proper information technology based on interaction Fourth, as a result of variance analysis of 3 spaces of Junior College Library and the services, the size of the space of service does not influence user satisfaction directly. Even the space is small, if it decorates variously like with a lighting for a user, a window seat to meet the nature of users and has specific factors such as space reservation using internet, user satisfaction is high. If we summarise the result of this study, to make user satisfaction for speace in a Junior College Library higher, not just we need to try to make it extend as a educational, a cultural place but we also need to accept the student's requirement that the space also needs to be extend as a complex cultural space.