• Title/Summary/Keyword: 사용자 관심

Search Result 2,453, Processing Time 0.024 seconds

A Macro Attacks Detection Model Based on Trace Back Information (트레이스 백 정보에 기반한 매크로 공격 탐지 모델)

  • Baek, Yong Jin;Hong, Suk Won;Park, Jae Heung;Kang, Gyeong Won;Kim, Sang Bok
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.113-120
    • /
    • 2018
  • Today, the development of information and communication technology is rapidly increasing the number of users of network-based service, and enables real-time information sharing among users on the Internet. There are various methods in the information sharing process, and information sharing based on portal service is generally used. However, the process of information sharing serves as a cause of illegal activities in order to amplify the social interest of the relevant stakeholders. Public opinion attack using macro function can distort normal public opinion, so security measures are urgent. Therefore, security measures are urgently needed. Macro attacks are generally defined as attacks in which illegal users acquire multiple IP or ID to manipulate public opinion on the content of a particular web page. In this paper, we analyze network path information based on traceback for macro attack of a specific user, and then detect multiple access of the user. This is a macro attack when the access path information for a specific web page and the user information are matched more than once. In addition, when multiple ID is accessed for a specific web page in the same region, it is not possible to distort the overall public opinion on a specific web page by analyzing the threshold count value.

  • PDF

Why Do Users Participate in Hashtag Challenges in a Short-form Video Platform?: The Role of Para-Social Interaction (숏폼 비디오 플랫폼에서 사용자는 왜 해시태그 챌린지에 참여하는가?: 준사회적 상호작용을 중심으로)

  • Li, Yi-Qing;Kim, Hyung-Jin;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.29 no.3
    • /
    • pp.82-104
    • /
    • 2022
  • One of the interesting social phenomena in short-form video platforms is the hashtag challenge wherein ordinary users are encouraged to create by imitating short viral videos on a particular theme. Despite the increasing popularity of hashtag challenges, theoretical discussion on related user behavior is still very insufficient. In this study, we attempted to examine the impact of micro-influencers in order to understand users' willingness to participate in hashtag challenges. For this purpose, the para-social interaction theory and imitation behavior literature were adopted as key theoretical basis. In an empirical investigation using 243 survey data from TikTok users, our study found that a user's illusion of intimacy with a micro-influencer (i.e., para-social interaction) had significant positive impact on the intention to participate in a hashtag challenge. This study also showed that the degree of para-social interaction in a short-form video platform was determined by both media content-related factors and media character-related factors (i.e., content attractiveness, physical attractiveness, and attitude homophily). Our work in this study provided significant theoretical and practical implications on how to leverage micro-influencers for the success of hashtag challenges in a short-form video platform.

How Design Elements of a Social Q&A Site Influence New Users' Continuance Behavior: An Application of Logistic Regression and XGBoost Techniques (소셜 Q&A 사이트의 디자인 요소가 신규 사용자의 지속사용에 미치는 영향: 로지스틱 회귀분석과 XGBoost 기법의 적용)

  • Minhyung Kang
    • Knowledge Management Research
    • /
    • v.24 no.2
    • /
    • pp.161-183
    • /
    • 2023
  • Social Q&A sites, where individuals freely ask and answer each other online, play an important role as a public knowledge repository. For their sustainable growth, social Q&A sites constantly need new askers and new answerers. However, previous studies have focused only on answerers, with little attention to new users or askers. This study examines the factors encouraging new users to continue using social Q&A sites based on motivational affordance theory and self-determination theory, and also investigates whether the factors differ depending on the types of users (i.e., new asker vs. new answerer). In addition, the moderating effect of prior experience with a member Q&A site was examined. Using logistic regression and XGBoost, we analyzed online activity data from 25,000 users in the Stack Exchange Network and found that design elements with motivational affordances had significant impacts on new users' continuance behavior. The experience of a member Q&A site negatively moderated the influence of the antecedents of continuance behavior. Interestingly, the influence of editing was not significant in the analysis of new users as a whole, but was significant in the separate analyses of askers (significantly negative) and answerers (significantly positive).

User Perception of Personal Information Security: An Analytic Hierarch Process (AHP) Approach and Cross-Industry Analysis (기업의 개인정보 보호에 대한 사용자 인식 연구: 다차원 접근법(Analytic Hierarch Process)을 활용한 정보보안 속성 평가 및 업종별 비교)

  • Jonghwa Park;Seoungmin Han;Yoonhyuk Jung
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.233-248
    • /
    • 2023
  • The increasing integration of intelligent information technologies within organizational systems has amplified the risk to personal information security. This escalation, in turn, has fueled growing apprehension about an organization's capabilities in safeguarding user data. While Internet users adopt a multifaceted approach in assessing a company's information security, existing research on the multiple dimensions of information security is decidedly sparse. Moreover, there is a conspicuous gap in investigations exploring whether users' evaluations of organizational information security differ across industry types. With an aim to bridge these gaps, our study strives to identify which information security attributes users perceive as most critical and to delve deeper into potential variations in these attributes across different industry sectors. To this end, we conducted a structured survey involving 498 users and utilized the analytic hierarchy process (AHP) to determine the relative significance of various information security attributes. Our results indicate that users place the greatest importance on the technological dimension of information security, followed closely by transparency. In the technological arena, banks and domestic portal providers earned high ratings, while for transparency, banks and governmental agencies stood out. Contrarily, social media providers received the lowest evaluations in both domains. By introducing a multidimensional model of information security attributes and highlighting the relative importance of each in the realm of information security research, this study provides a significant theoretical contribution. Moreover, the practical implications are noteworthy: our findings serve as a foundational resource for Internet service companies to discern the security attributes that demand their attention, thereby facilitating an enhancement of their information security measures.

A Usability Testing for the Verification of User Mental Model in Using Multifunction Printer (프린터 복합기의 사용자 심성모형 검증을 위한 사용성 평가)

  • Chung, Sung-Jae;Kim, Bong-Gun;Ha, Kwang-Soo;Jung, Hye-Heon;Lim, Bong-Uk
    • Science of Emotion and Sensibility
    • /
    • v.13 no.1
    • /
    • pp.1-10
    • /
    • 2010
  • This study is about what process and methodology could make UI designer be able to achieve the interface which considers user's mental model through implementing corporate line-up model, when people design an interface between product of multi-function printer and user. The most important concern of UI designers who are dealing with an interface between product and user is how they can make product system image match user's mental model so that users can utilize products without any confusion and discomfort. If concept model which designers bring up and mental model which users expect and recognize could be of one accord, then users can feel ease of use toward products. The understanding and observation for user behavior and use pattern is prerequisite to develop user-centered interface between product and user. However, UI designers do design interface from their own perspective and assumption in many business areas, and users do not react as designers assumed and intended in many cases or examples. This study is to find inappropriate system images against users' mental model on basic function of multi-function printer, and the relationship of system image and user's mental model is diagramed to build up a hypothesis. The hypothesis from this study is validated through evaluation of domestic and international users. In addition, two suggestions to improve usability problems revealed from user test are proposed. The optimal solution is designed based on the result of user evaluation and consideration of many user environments, and then it is implemented to line-up product. In conclusion, this study considers how UI designers can create system image which is close to user's mental model.

  • PDF

Public Key based Secure Data Management Scheme for the Cloud Data Centers in Public Institution (공공기관 클라우드 데이터 센터에 활용 가능한 공개키 기반의 안전한 데이터 관리 기법)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.467-477
    • /
    • 2013
  • The cloud computing has propagated rapidly and thus there is growing interest on the introduction of cloud services in the public institution. Accordingly, domestic public institution are adoption of cloud computing impose and devise a plan. In addition, more specifically, is building a cloud computing system in the public institution. However, solutions to various security threats(e.g., availability invasion of storage, access by unauthorized attacker, data downloaded from uncertain identifier, decrease the reliability of cloud data centers and so on) is required. For the introduction and revitalize of cloud services in the public institution. Therefore, in this paper, we propose a public key based secure data management scheme for the cloud data centers in public institution. Thus, the use of cloud computing in the public institutions, the only authorized users have access to the data center. And setting for importance and level of difficulty of public data management enables by systematic, secure, and efficient. Thus, cloud services for public institution to improve the overall security and convenience.

A Study on Authentication of Mobile Agency AP Connection Using Trusted Third Party in Smart Phone Environment (스마트폰 환경에서 신뢰기관을 이용한 이동 통신사 AP 접속 인증에 관한 연구)

  • Lee, Gi-Sung;Min, Dae-Gi;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5496-5505
    • /
    • 2012
  • As the IT industry develops, the smart-phone technology and functions which are actively being studied at the moment greatly influence the entire living environment. With the smart-phone technology and functions, people's interest for the wireless LAN which can be used to get access to the Internet anytime anywhere is gradually increasing. However, since the malicious attacker can easily carry out hacking or approach the contents due to the characteristics of the wireless radio wave, the personal information with a high level of importance for data security is easily exposed due to Spoofing, Denial of Service attack and Man in the Middle attack. Therefore, the demand for security is gradually increasing. In this paper, the safe wireless network service environment is provided by supplementing the vulnerability in regard to Spoofing, Session Hijacking and Man in the Middle attack after executing the client's authentication process, the AP authentication process and the Mobile Agency authentication process with the client's information in the USIM, the AP information and the Mobile Agency information when the client uses the wireless Internet through the Mobile Agency AP access in the smart phone environment.

A Study on Antecedents of SNS User's Addiction in the Age of Convergence: The Role of SNS Habit (융복합 시대에 소셜 네트워크 서비스 사용자들의 중독 요인에 대한 연구: 습관의 역할)

  • Kim, Byoung-Soo;Kim, Dae-Kil
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.161-168
    • /
    • 2015
  • Given social problems of social network service (SNS) addiction, it is critical to understand user's formation mechanism of SNS addiction. Since a number of studies have demonstrated the negative outcomes of excessive SNS use, the researchers examined important antecedents of SNS addiction as SNS habit that is considered as a key driver of SNS addiction. Moreover, the effects of self-expression, network management, and information search on SNS addition formation were investigated. The proposed theoretical model was empirically tested by using longitudinal survey data collected from 206 Facebook users. The analysis results indicate that SNS habit plays an important role in forming SNS addiction. Further, self-expression, network management, and information search influence SNS addiction through SNS habit. The analysis results offer some in-depth perspectives to SNS providers and government that establish policies or digital convergence strategies to induce healthy SNS use.

A Study on the Utilization of Public Interaction Design Convergence (공공성 구현을 위한 인터랙션을 활용한 융복합 공공디자인 연구)

  • Park, Gun-Kyu;Kim, Won-Seok;Ro, Hae-Sin
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.449-455
    • /
    • 2015
  • This paper is about the utilization of public interaction design in terms of design convergence study. As there are different perspectives about public character in various academic fields, it is not simple to define the concept of it. In Korea, since 1960's, the public art which considered only about places has received more and more people's attention. But, there still remain disputes over the residents' participation and communication problems. It is more important to debate mainly on the value judgments of the public design considering artistic experience, ease, functionality, and utility in the interaction rather than a focus on user's experience. On the basis of this, it is suggested bench design which includes flower motif to access and utilize freely to necessary information and the bench design will be helpful to provoke interaction and design convergence in the era of new media technology.

Improving on Matrix Factorization for Recommendation Systems by Using a Character-Level Convolutional Neural Network (문자 수준 컨볼루션 뉴럴 네트워크를 이용한 추천시스템에서의 행렬 분해법 개선)

  • Son, Donghee;Shim, Kyuseok
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.2
    • /
    • pp.93-98
    • /
    • 2018
  • Recommendation systems are used to provide items of interests for users to maximize a company's profit. Matrix factorization is frequently used by recommendation systems, based on an incomplete user-item rating matrix. However, as the number of items and users increase, it becomes difficult to make accurate recommendations due to the sparsity of data. To overcome this drawback, the use of text data related to items was recently suggested for matrix factorization algorithms. Furthermore, a word-level convolutional neural network was shown to be effective in the process of extracting the word-level features from the text data among these kinds of matrix factorization algorithms. However, it involves a large number of parameters to learn in the word-level convolutional neural network. Thus, we propose a matrix factorization algorithm which utilizes a character-level convolutional neural network with which to extract the character-level features from the text data. We also conducted a performance study with real-life datasets to show the effectiveness of the proposed matrix factorization algorithm.