• 제목/요약/키워드: USER MANAGEMENT

검색결과 6,203건 처리시간 0.03초

시맨틱 콘텐츠 검색을 위한 질의 확장 시스템 (Query Expansion System for Semantic Contents Retrieval)

  • 이무훈;최의인
    • 디지털융복합연구
    • /
    • 제10권10호
    • /
    • pp.307-312
    • /
    • 2012
  • 최근 논리적으로 표현된 지식 베이스를 사용하는 키워드 기반 검색에서 보다 더 정확한 결과를 제공하기 위해 시맨틱 검색 방법에 대한 연구가 진행되고 있다. 대부분의 사용자는 정형화된 질의어와 스키마를 사용하는 것 보다 사용자 키워드의 의미를 해석해서 사용한다. 본 논문에서는 시맨틱 검색을 위한 사용자 질의 확장을 제안한다. 제안 시스템에서는 지식 베이스와 연관 검색어를 활용한 사용자 질의 확장 콤포넌트와 사용자 질의 해석 결과를 조정하기 위한 콤포넌트를 제공한다. 마지막으로 논문에서 제안한 사용자 질의 의미 해석 기법의 검증을 위해 프로토타입 시스템의 실험 결과를 설명한다.

ASP(Application Service Provider) 서비스 사용자의 재구매 의사와 조직 이익에 미치는 영향요인 연구 (A study on the factors influencing the ASP service users' repurchase intent and organization benefits)

  • 김경규;신호경;김수현
    • Journal of Information Technology Applications and Management
    • /
    • 제17권1호
    • /
    • pp.55-81
    • /
    • 2010
  • ASP service users' needs for flexible and customized services to deal with changes in business environments and user contexts seems to be appealing due to the progress of technology and IT paradigm such as ubiquitous computing and web 2.0. Through the lens of expectancy confirmation and flexibility, we explored factors that influence users' repurchase intent and organizational benefit in ASP services. With an empirical study, we examined information quality, service quality, flexibility, customization, user satisfaction, trust in ASP services can contribute to the repurchase intent and organizational benefit. In addition to, business type and company size are added to the research model as control variables for user satisfaction, trust, and repurchase intent. Our findings suggested that the service quality and flexibility significantly were cruicial determinant of user satisfaction in ASP services. Furthermore, user satisfaction significantly influenceS repurchase intent, and organization benefits were affected by repurchase intent. This study has important implications for academic researchers and practitioners who seek to understand factors that affect ASP service users' repurchase intent and organization benefits.

  • PDF

도서 정보 및 본문 텍스트 통합 마이닝 기반 사용자 맞춤형 도서 큐레이션 시스템 (Personalized Book Curation System based on Integrated Mining of Book Details and Body Texts)

  • 안희정;김기원;김승훈
    • Journal of Information Technology Applications and Management
    • /
    • 제24권1호
    • /
    • pp.33-43
    • /
    • 2017
  • The content curation service through big data analysis is receiving great attention in various content fields, such as film, game, music, and book. This service recommends personalized contents to the corresponding user based on user's preferences. The existing book curation systems recommended books to users by using bibliographic citation, user profile or user log data. However, these systems are difficult to recommend books related to character names or spatio-temporal information in text contents. Therefore, in this paper, we suggest a personalized book curation system based on integrated mining of a book. The proposed system consists of mining system, recommendation system, and visualization system. The mining system analyzes book text, user information or profile, and SNS data. The recommendation system recommends personalized books for users based on the analysed data in the mining system. This system can recommend related books using based on book keywords even if there is no user information like new customer. The visualization system visualizes book bibliographic information, mining data such as keyword, characters, character relations, and book recommendation results. In addition, this paper also includes the design and implementation of the proposed mining and recommendation module in the system. The proposed system is expected to broaden users' selection of books and encourage balanced consumption of book contents.

자유로운 문자열의 키스트로크 다이나믹스와 일범주 분류기를 활용한 사용자 인증 (User Authentication Based on Keystroke Dynamics of Free Text and One-Class Classifiers)

  • 서동민;강필성
    • 대한산업공학회지
    • /
    • 제42권4호
    • /
    • pp.280-289
    • /
    • 2016
  • User authentication is an important issue on computer network systems. Most of the current computer network systems use the ID-password string match as the primary user authentication method. However, in password-based authentication, whoever acquires the password of a valid user can access the system without any restrictions. In this paper, we present a keystroke dynamics-based user authentication to resolve limitations of the password-based authentication. Since most previous studies employed a fixed-length text as an input data, we aims at enhancing the authentication performance by combining four different variable creation methods from a variable-length free text as an input data. As authentication algorithms, four one-class classifiers are employed. We verify the proposed approach through an experiment based on actual keystroke data collected from 100 participants who provided more than 17,000 keystrokes for both Korean and English. The experimental results show that our proposed method significantly improve the authentication performance compared to the existing approaches.

A Study on the Preparation of Standardized Operation Criteria for Enhancement of Safety and Convenience of Mobile Electronic Notice Service

  • JongBae, Kim
    • International Journal of Advanced Culture Technology
    • /
    • 제10권4호
    • /
    • pp.547-554
    • /
    • 2022
  • Due to the expansion of non-face-to-face services, the demand for user identification for mobile devices is increasing. Recently, mobile resident registration cards, mobile driver's licenses, etc. are installed in mobile phones and used for user identification and authentication services. In order to identify a user online, unique identification information of the online user is required. In particular, in order to provide information only to online users, it is necessary to accurately deliver information to a mobile device owned by the user. To make this service possible, it was realized with the advent of mobile electronic notice service. However, the identification of online service users and information on mobile devices owned or subscribed by the relevant users require safe management as personal information, and it is also necessary to increase the convenience of online service users. In this paper, we propose an operating standard for providing a mobile electronic notice service that sends electronic notice using a mobile device owned by the user. The mobile electronic notice service is a service that provides notices expressed in electronic information to the recipient's cell phone, mobile app, e-mail, etc. Therefore, as the use of mobile electronic notification service increases and the provision and use of connecting information to identify users increases, it is necessary to expand the mobile electronic notification service while safely protecting users' personal information.

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • 제23권8호
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.

User Information Collection of Weibo Network Public Opinion under Python

  • Changhua Liu;Yanlin Han
    • Journal of Information Processing Systems
    • /
    • 제19권3호
    • /
    • pp.310-322
    • /
    • 2023
  • Although the network environment is gradually improving, the virtual nature of the network is still the same fact, which has brought a great influence on the supervision of Weibo network public opinion dissemination. In order to reduce this influence, the user information of Weibo network public opinion dissemination is studied by using Python technology. Specifically, the 2019 "Ethiopian air crash" event was taken as the research subject, the relevant data were collected by using Python technology, and the data from March 10, 2019 to June 20, 2019 were constructed by using the implicit Dirichlet distribution topic model and the naive Bayes classifier. The Weibo network public opinion user identity graph model under the "Ethiopian air crash" on June 20 found that the public opinion users of ordinary netizens accounted for the highest proportion and were easily influenced by media public opinion users. This influence is not limited to ordinary netizens. Public opinion users have an influence on other types of public opinion users. That is to say, in the network public opinion space of the "Ethiopian air crash," media public opinion users play an important role in the dissemination of network public opinion information. This research can lay a foundation for the classification and identification of user identity information types under different public opinion life cycles. Future research can start from the supervision of public opinion and the type of user identity to improve the scientific management and control of user information dissemination through Weibo network public opinion.

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • 한국멀티미디어학회논문지
    • /
    • 제19권2호
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.

MAC Address와 OTP를 이용한 비인가 접근 거부 시스템 (A System Unauthorized Access using MAC Address and OTP)

  • 신승수;정윤수
    • 디지털융복합연구
    • /
    • 제10권3호
    • /
    • pp.127-135
    • /
    • 2012
  • 본 논문에서는 기존의 ID, PW를 이용한 사용자 식별 인증 시스템 방식을 보완하여 ID, PW, OTP를 이용한 사용자 인증과 네트워크상의 컴퓨터 구별 방법 중 MAC Address를 이용한 방법을 이용하여 비인가 사용자 접근을 거부하는 시스템에 대한 프로토콜을 설계하고 구현한다. 비인가 시용자의 인증 시도에 대한 안전성 분석에서는 비인가 사용자의 정보 취득 정도를 네 가지로 나누어 안전성에 대해 분석했다.

상황인지 컴퓨팅 환경에서 복합서비스를 제공하는 서비스시스템의 성능분석 (Performance Analysis of a Composite Service Providing System in a Context-Aware Computing Environment)

  • 남진규;허선;주국선;신동민
    • 대한산업공학회지
    • /
    • 제35권1호
    • /
    • pp.51-57
    • /
    • 2009
  • There are a variety of users and devices in a context-aware computing environment. In this environment, the service provided to a user may be the composition of diverse services rather than one independent service. Before user's devices provide the composite service to the user, they should perceive user's needs by gathering related information segments from other surrounding devices and/or sensors. We consider a context-aware computing environment providing composite and adapted service to users and propose an information processing model that characterizes the device where the collected data should be processed through services and/or applications. Based on this model, we provide an analytical tool to obtain some performance measures of the context-aware computing environment.