• Title/Summary/Keyword: USER MANAGEMENT

Search Result 6,203, Processing Time 0.031 seconds

Visual Preference Factor Analysis for the form of bus stop shelter (버스정류장 쉘터 형태의 시각적 선호요인 분석)

  • 유상완;온순기
    • Archives of design research
    • /
    • v.16 no.4
    • /
    • pp.405-412
    • /
    • 2003
  • This research investigated the preference factor which has an effect on the forms of bus stop shelter in order to grasp the visual preference factor, which is necessary for planning and designing of bus stop shelter centering around user, starting with the question of the research regarding that a shelter is preferred by what kind of factor when the environmental conditions are regular. This research examined the relation between visual preference and preference factor which has an effect on it with Multiple Regression Analysis after evaluating visual preference for shelter form by user as applying of scoring system of Interval Scale. The result of the factor analysis by visual evaluation for the form of bus stop shelter through the said research result will have an great effect on the design of bus stop shelter centering around its user. Therefore, this research result will give a knowledge which is necessary for the plan and the installation of bus stop shelter, and contributes to shelter design and bus stop promotion which can maximize the satisfaction of user. As well, concerning the management of bus stop facilities, it will give useful guidelines for planning strategically the shelter management centering around user. In particular, It is estimated that the preference factor analysis by visual evaluation of the mass transportation user in daily life will be the cardinal point for bus stop plan.

  • PDF

Development and Measurement of User Satisfaction Index Model for Information Systems (정보시스템의 이용자만족지수 모형개발 및 측정)

  • Kim, Heesop;Park, Yong-Jae
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.4 s.54
    • /
    • pp.153-171
    • /
    • 2004
  • The measurement of information system (IS) effectiveness is critical to understanding of the value and efficacy of IS actions and IS investments. In this paper, we propose a new model of the user satisfaction index for ISs and present the user satisfaction index which is measured by the proposed model. Based on the representative theories and models in the field of marketing and IS, we propose a new user satisfaction index model and verify the new model through the analysis of structural equation model. The proposed model consists of four basic dimensions : information quality, service quality, systems quality, and user satisfaction. Also, users' royalty and complaint are adopted as the additional dimension in this model. Data was collected from the ITFIND users to measure their satisfaction index. We, then, suggest some strategic guidelines for the better ITFIND which may useful when the system designers consider upgrading of the system in the future.

Management Method to Secure Private Key of PKI using One Time Password (OTP를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.12
    • /
    • pp.565-573
    • /
    • 2014
  • We have various e-commerce like on-line banking, stock trading, shopping using a PC or SmartPhone. In e-commerce, two parties use the certificate for identification and non-repudiation but, the attack on the certificate user steadily has been increasing since 2005. The most of hacking is stealing the public certificate and private key files. After hacking, the stolen public certificate and private key file is used on e-commerce to fraud. Generally, the private key file is encrypted and saved only with the user's password, and an encrypted private key file can be used after decrypted with user password. If a password is exposed to hackers, hacker decrypt the encrypted private key file, and uses it. For this reason, the hacker attacks user equipment in a various way like installing Trojan's horse to take over the user's certificate and private key file. In this paper, I propose the management method to secure private key of PKI using One Time Password certification technique. As a result, even if the encrypted private key file is exposed outside, the user's private key is kept safely.

Analyzing Substantive Theories in User Studies of Information Seeking on the Web (이용자 중심 웹 정보탐색 연구의 실체이론 분석)

  • Kim, Sung-Jin
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.3 s.61
    • /
    • pp.127-146
    • /
    • 2006
  • This study aims to analyze substantive theories in user studies on Web-based information seeking in order to explore the implications of building a unified theory in this field, Substantive theory is defined as research which generalized user behaviors during information seeking on the Web or suggested significant relationships between variables in Web-based information seeking context. The sample of research articles were published in four core journals from 1995 to 2005, Among 42 articles of user-based information seeking on the Web, ten articles were contributed to the development of substantive theories. Findings show that substantive theories used thirteen dependent and ten independent variables and 22 relationships were considered as significant. They have a tendency to focus on individual differences of users and on some specific narrow aspects(i.e. searching or searching time) of user behaviors. Findings suggested a range of implications for a unified theory construction.

User Privacy management model using multiple group factor based on Block chain (블록 체인 기반의 다중 그룹 요소를 이용한 사용자 프라이버시 관리 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.107-113
    • /
    • 2018
  • With the rapid development of big data and Internet technologies among IT technologies, it is being changed into an environment where data stored in the cloud environment can be used wherever the Internet is connected, without storing important data in an external storage device such as USB. However, protection of users' privacy information is becoming increasingly important as the data being processed in the cloud environment is changed into an environment that can be easily handled. In this paper, we propose a user-reserving management model that can improve the user 's service quality without exposing the information used in the cloud environment to a third party. In the proposed model, user group is grouped into virtual environment so that third party can not handle user's privacy information among data processed in various cloud environments, and then identity property and access control policy are processed by block chain.

Development of an Online Men's Suits Customizing System using Heuristic Procedure for Wheelchair Users (휴리스틱 기법을 이용한 휠체어 사용자를 위한 온라인 남성정장 맞춤시스템 개발)

  • Jeong, Minseok;Yang, Chuneun;You, Heecheon;Park, Kwangae;Lee, Wonsup
    • Fashion & Textile Research Journal
    • /
    • v.18 no.2
    • /
    • pp.225-234
    • /
    • 2016
  • An online suit-customizing system for the special accessibility needs of wheelchair users should be developed because the demand for business suits by wheelchair users involved in economic activities has increased. This study develops a user interface an online customizing system for men's suits specialized for wheelchair users. This study used a five-step approach: (1) search for online men's suits customizing system in web porter sites, (2) select three sites based on three terms, (3) heuristic testing with five web specialists, (4) development of a system user interface based on suggestions for improvement from the heuristic test, (5) usability testing of the user interface prototype by 10 disabled men in wheelchairs. The interface of Company S had high ratings on interactivity, accessibility, informativeness, and consistency in the heuristic test results; subsequently, a user interface was developed based on suggestions for improvement from the heuristic test. This online user interface for customizing men's suits provides better usability to wheelchair users than existing online interfaces aimed at the non-disabled and disabled; consequently, this study contributes to the commercialization of an online customizing system for men's suits specializing in serving wheelchair users.

ADAM: An Approach of Digital Asset Management system (사후 디지털 자산 관리 시스템에 관한 연구)

  • Moon, Jeong-Kyung;Kim, Hwang-Rae;Kim, Jin-Mook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1977-1982
    • /
    • 2012
  • Social network service user or smart phone user is very convenient, because there are supported to various social network services such as Facebook, Twitter, Flickr, Naver blog, Daum blog, and so on. This Is very good because they store multimedia datas that user wants to cyber space if they want it conveniently. But, if social network user increases, space of cloud storage increases sharply, and when social network service used user dies then they have big problems such as they did not know in existing. Typically, problems of notice, dissemination, storage, and inheritance for digital asset can happen representatively. Now, If successor send relation information of he and his dead user that is family to social network service provider then service provider checks it. And successor may can use, save and only backup are possible after confirm of family relation truth. Therefore, We wish to propose ADAM that successor may can inherit digital assets easily, conveniently, and safely in this paper. If someone use ADAM, successor submits information about dead and own family relation in the third certification party. And ADAM can be inherited freely and conveniently about digital assets as general assets passing through right inheritance process.

A study on User experience of Fintech Application Service -Focused on Toss and Kakaobank- (핀테크 애플리케이션의 사용자 경험 연구 -토스와 카카오뱅크를 중심으로-)

  • Kim, Hyun-Woo;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.18 no.1
    • /
    • pp.287-293
    • /
    • 2020
  • This study is about comparing and analyzing the representative fintech application service, Toss, and Kakaobank from the user's point of view and suggest development according to the main factors of user experience. The experimental group who have used both mobile application was recruited to do a task about deposit and withdrawal service. After the task, an in-depth interview was conducted by reorganizing the "Creating Pleasurable Interface model" by Stephen P. Anderson. Interview questionnaire is based on propensity and feature of generation 2030. As a result of the experiment, the user showed satisfaction with usability and showed different application usage experience depend on financial transaction propensity and money management. Therefore, the application needs features that could grasp the propensity and also service to manage money in everyday life. Based on this study, it is expected to develop be user-based fintech application service in related fields.

Pre-Processing of Query Logs in Web Usage Mining

  • Abdullah, Norhaiza Ya;Husin, Husna Sarirah;Ramadhani, Herny;Nadarajan, Shanmuga Vivekanada
    • Industrial Engineering and Management Systems
    • /
    • v.11 no.1
    • /
    • pp.82-86
    • /
    • 2012
  • In For the past few years, query log data has been collected to find user's behavior in using the site. Many researches have studied on the usage of query logs to extract user's preference, recommend personalization, improve caching and pre-fetching of Web objects, build better adaptive user interfaces, and also to improve Web search for a search engine application. A query log contain data such as the client's IP address, time and date of request, the resources or page requested, status of request HTTP method used and the type of browser and operating system. A query log can offer valuable insight into web site usage. A proper compilation and interpretation of query log can provide a baseline of statistics that indicate the usage levels of website and can be used as tool to assist decision making in management activities. In this paper we want to discuss on the tasks performed of query logs in pre-processing of web usage mining. We will use query logs from an online newspaper company. The query logs will undergo pre-processing stage, in which the clickstream data is cleaned and partitioned into a set of user interactions which will represent the activities of each user during their visits to the site. The query logs will undergo essential task in pre-processing which are data cleaning and user identification.

Design and Implementation of Library Chatbot for Non-face-to-face Reference Services (비대면 참고정보서비스를 위한 도서관 챗봇 설계 및 구현 연구)

  • Yoo, Jiyoon
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.151-179
    • /
    • 2020
  • This study explores the potential of using a library chatbot to improve the non-face-to-face digital reference services for academic library users by designing and implementing a library chatbot. Through data analysis, user needs and library services were analyzed, and a scenario was designed by selecting an appropriate development method. For user-friendly interaction, the personality of the chatbot and user interface was designed to evaluate its usability. In addition, the accuracy was verified through the response accuracy evaluation and performance evaluation of the chatbot, and the effectiveness of the chatbot was evaluated through a user satisfaction survey. In order to manage the operation and maintain service quality, the chatbot is improved by monitoring user-chatbot conversations and reflecting user feedback. Based on these findings, recommendations for designing and implementing a library chatbot were made to help improve library reference services.