• Title/Summary/Keyword: 행위패턴

Search Result 381, Processing Time 0.04 seconds

A Study on the Relation between Culture and the Use of a Refrigerator -with Emphasis on the Differences between Korean and USA User Experience of a Refrigerator- (문화적 차이가 냉장고 사용행태에 미치는 영향에 관한 연구 - 한국과 미국의 냉장고 사용 행태 비교 관찰을 중심으로 -)

  • Cho, Yun-Jin;Kim, Jung-Ha
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02b
    • /
    • pp.795-802
    • /
    • 2006
  • 현대의 소비자는 더 이상 단순히 감성적 소구에 의해서나 기술적 기능을 제공하는 것으로 제품을 구매하지 않는다. 제품의 결정은 사용자와 제품 간의 상호작용에 따른 정서, 인지, 행위 등에 의한 총체적인 경험에 의한 것이며, 그러한 소비자들의 경험은 지리적, 역사적 전통으로 고착된 문화적 특성이 제품을 통한 사용자 경험의 기저에서 작용함으로써 문화권 별, 국가 별로 각기 다르게 구성된다. 특별히 음식 문화는 어느 나라이든 자연 조건의 영향과 함께 오랜 역사 속에서 형성되었기 때문에 독특하고 다양한 문화적 차이를 지니고 있으며 이러한 문화적 차이는 냉장고 사용에 있어서 다양한 사용행태를 구분 짓는다. 따라서 본 연구를 통해 식품 종류에 의한 영향뿐 아니라 내부 공간 활용의 패턴, 냉장고 환경 설정에 대한 능동적인 태도, 냉장고에서 제공하는 파티션이나 옵션에 대한 수용 정도, 식품의 정리 원칙에 대한 준수 정도 등에 따른 사용행태 간의 차이점을 발견하고, 차별적 사용행태의 기저에 존재하는 문화적 요인을 분석하여 문화적 차이가 사용자의 경험에 영향을 끼치게 됨으로 인하여 냉장고 디자인에 어떠한 변화를 초래하는지 그 연관성을 밝혀내고자 한다. 보다 실제적인 용도로 활용 가능하도록 냉장고 제작의 상업적인 측면을 고려하여 냉장고 내상의 레이아웃에 중점을 두어 본 연구를 진행하였다. 본 연구는 설문과 현장 관찰을 통해 정량적 관찰을 중심으로 분석하였다. 두 국가의 문화 비교를 위한 설문은 이미 여러 연구자료에 의해 검증된 Trompenaars의 문화 변수를 바탕으로 제작 하였다. 또한 정량적 연구에서 발견될 수 없는 문화권 별 여러 특징들에 대한 데이터를 구체적으로 수집하기 위하여 정성적인 연구 방식의 일환으로 실제 관찰 및 사용자 인터뷰를 실시하였으며, 이를 통하여 현상의 원인 및 사용자의 의도를 파악하도록 연구를 진행하였다.

  • PDF

Dwelling Characteristics of Geese Families based on the Analysis of Sleeping and Studying Patterns in Vancouver (자녀의 취침 및 학습 행위 패턴으로 본 기러기 가족의 주생활 특성 연구 - 캐나다 밴쿠버 지역의 조기 유학생 가정을 대상으로 -)

  • Lee, Hyun-Hee
    • The Korean Journal of Community Living Science
    • /
    • v.21 no.3
    • /
    • pp.365-377
    • /
    • 2010
  • This study examined the changes in sleeping and studying patterns of young students and their mothers after moving to foreign countries. This study analyzed the relational characteristics of Geese Family members which are summarized as follows: 1) Sleeping Pattern: At the early stages of settling into foreign countries, students begin to sleep in the same bedroom with their mothers, who had used to sleep in separate bedrooms back in Korea. This change in pattern may slightly vary according to the age and gender of the students, and type of residence. Relationships between young students and mothers become more tightly coupled. However, relationships between students and fathers become less tightened. 2) Studying Pattern: Students tend to study in the public space such as the living room and dining areas, rather than in their own private rooms. This is because mothers want to support and focus upon their children's study by sacrificing normal family activities. These patterns appear stronger as their period of study in the foreign country becomes shorter and the ages of the students become younger. These studying patterns also contribute to the coupling between mothers and young students. 3) Family Relationships: From the period as Geese Families, the relation between mothers and young students become closer both physically and emotionally. The relation between fathers and children become less close. The role of fathers is degraded to that of supporter or negotiator for the time period of the mothers and child students in the foreign country.

A Study on Facial expressions for the developing 3D-Character Contents (3D캐릭터콘텐츠제작을 위한 표정에 관한 연구)

  • 윤봉식;김영순
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.478-484
    • /
    • 2004
  • This study is a fundamental research for the developing 3D character contents about facial expression as a sort of non-linguistic signs, focusing on an expression of emotion factors of a person. It contributes a framework for symbolic analysis about Human's emotions along with a general review of expression. The human face is the most complex and versatile of all species. For humans, the face is a rich and versatile instrument serving many different functions. It serves as a window to display one's own motivational state. This makes one's behavior more predictable and understandable to others and improves communication. The face can be used to supplement verbal communication. A prompt facial display can reveal the speaker's attitude about the information being conveyed. Alternatively, the face can be used to complement verbal communication, such as lifting of eyebrows to lend additional emphasis to stressed word. The facial expression plays a important role under the digital visual context. This study will present a frame of facial expression categories for effective manufacture of cartoon and animation that appeal to the visual emotion of the human.

  • PDF

Anti-Spam for VoIP based on Turing Test (튜링 테스트 기반으로 한 VoIP 스팸방지)

  • Kim, Myung-Won;Kwak, Hu-Keun;Chung, Kyu-Sik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.261-265
    • /
    • 2008
  • As increasing the user of VoIP service using ITSP(Internet Telephony Service Provider), the VoIP spam becomes a big problem. The spam used in the existing public telephone is detected by using the pattern inspection of call behavior because it is difficult to filter contents for the characteristic of real-time voice communication. However there is a false-positive problem. The threat on spam remains where spam with low threshold can't be detected or users share one number. In this paper, we propose anti-spam for VoIP based on luring test. The proposed method gives a user luring test and he/she can connect to a receiver if passing turing test. A ticket is given to a user that pass luring test and it reduces overhead of luring test in re-dial. The proposed method is implemented on ASUS WL-500G wireless router and Asterisk IP-PBX. Experimental results show the effectiveness of the proposed method.

Study on Relationship of Channel-Selection-Type & Audiences in TV News (TV 뉴스 콘텐츠의 채널 선택 유형에 따른 수용자 특성)

  • Kim, Seung-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.6
    • /
    • pp.99-106
    • /
    • 2007
  • This study aimed at finding out news viewership composition of the major 5 broadcasting companies in Korea and analysing the reasons behind their channel choice as we live in so-called the 'multi-channel era'. To figure out demographic features and channel preferences of viewers, the study focused on the 4 watcher types; channel loyalty type, brief news type, central watcher type and peripheral watcher type. The result shows that most viewers fall into the 'brief new type', which means that there is a close relation between life style changes and TV news-contents viewership. Channel preferences were found to differ according to demographic features of viewers like gender, age and professions.'Central Watcher' type was found to prefer KBS1; 'channel loyalty' type, MBC; 'peripheral watcher', SBS; and 'brief news' type, YTN, while only KBS2 has no distinctive viewership of its own.

A Study About User Pattern of Social Bookmarking System (소셜 북마킹 시스템의 이용자 행위 패턴에 관한 연구)

  • Jo, Hyeon;Choeh, Joon-Yeon;Kim, Soung-Hie
    • Journal of Internet Computing and Services
    • /
    • v.12 no.5
    • /
    • pp.29-37
    • /
    • 2011
  • Recently, many user-participating web services have been used widely as the evolution of internet web technology has rapidly been developed. Users share various content and opinion on line using a site like ‘Social bookmarking.’ Users can share others’ bookmarking history and create tags while bookmarking web sites; we call it collaborative tagging. In this paper, we studied empirical analysis for widely used social bookmarking and collaborative tagging which the result shows minority of users is actively using the bookmarking and a few sites and tags are used by majority of the users. 24% users tagged 80%, 75% sites and 81% tags were tagged below than 3 times. Types of bookmarking activities were found different by users and early appointed tags get more frequency by majority. We also identified relative proportions of tags on certain sites are becoming convergence gradually. We expect the result of this paper will give opportunities to help further developing social bookmarking system.

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

A Study on Smart EDR System Security Development (Smart EDR 시스템구축을 위한 보안전략과 발전방안)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.41-47
    • /
    • 2020
  • In the corporate information system environment, detecting and controlling suspicious behaviors occurring at the end point of the actual business application is the most important area to secure the organization's business environment. In order to accurately detect and block threats from inside and outside, it is necessary to be able to monitor all areas of all terminals in the organization and collect relevant information. In other words, in order to maintain a secure business environment of a corporate organization from the constant challenge of malicious code, everything that occurs in a business terminal such as a PC beyond detection and defense-based client security based on known patterns, signatures, policies, and rules that have been universalized in the past. The introduction of an EDR solution to enable identification and monitoring is now an essential element of security. In this study, we will look at the essential functions required for EDR solutions, and also study the design and development plans of smart EDR systems based on active and proactive detection of security threats.

A Correlation Analysis between Alcohol Accumulate and Liver Function State through Color Change Analysis of the Left Cheek and White Eyes (왼뺨 및 흰 눈동자 색상 변화 분석을 통한 알코올 누적과 간 기능 상태와의 상관성 분석)

  • Kim, Bong-Hyun;Cho, Dong-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.971-978
    • /
    • 2011
  • There is a method to judge state of organs by looking color and shape of face in diagnosis of Oriental Medicine, So, to diagnosis of health condition has been applied development medical services act of using it as check for defects of organs in face. In this paper, we performed analysis white pupils and left cheek in face area change of color according to accrue of alcohol associated with liver function status based on diagnosis method Oriental Medicine. From that, we applied Lab digital color system to extraction of left cheek and white pupils area in facial image. To analysis patterns in color change of left cheek. white pupils area according to alcohol accumulative steps carried out study based on analysis of medical interrelationship of liver function,

A Meta Analysis of Innovation Diffusion Theory based on Behavioral Intention of Consumer (혁신확산이론 기반 소비자 행위의도에 관한 메타분석)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.140-141
    • /
    • 2017
  • Big data analysis, in the large amount of data stored as the data warehouse which it refers the process of discovering meaningful new correlations, patterns, trends and creating new values. Thus, Big data analysis is an effective analysis of various big data that exist all over the world such as social big data, machine to machine (M2M) sensor data, and corporate customer relationship management data. In the big data era, it has become more important to effectively analyze not only structured data that is well organized in the database, but also unstructured big data such as the internet, social network services, and explosively generated web documents, e-mails, and social data in mobile environments. By the way, a meta analysis refers to a statistical literature synthesis method from the quantitative results of many known empirical studies. We reviewed a total of 750 samples among 50 studies published on the topic related as IDT between 2000 and 2017 in Korea.

  • PDF