• Title/Summary/Keyword: User's Behavior

Search Result 870, Processing Time 0.021 seconds

Device-Centered Personalized Product Recommendation Method using Purchase and Share Behavior in E-Commerce Environment (이커머스 환경에서 구매와 공유 행동을 이용한 기기 중심 개인화 상품 정보 추천 기법)

  • Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.4
    • /
    • pp.85-96
    • /
    • 2022
  • Personalized recommendation technology is one of the most important technologies in electronic commerce environment. It helps users overcome information overload by suggesting information that match user's interests. In e-commerce environment, both mobile device users and smart device users have risen dramatically. It creates new challenges. Our method suggests product information that match user's device interests beyond only user's interests. We propose a device-centered personalized recommendation method. Our method uses both purchase and share behavior for user's devices interests. Moreover, it considers data type preference for each device. This paper presents a new recommendation method and algorithm. Then, an e-commerce scenario with a computer, a smartphone and an AI-speaker are described. The scenario shows our work is better than previous researches.

New Authentication Methods based on User's Behavior Big Data Analysis on Cloud (클라우드 환경에서 빅데이터 분석을 통한 새로운 사용자 인증방법에 관한 연구)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.31-36
    • /
    • 2016
  • User authentication is the first step to network security. There are lots of authentication types, and more than one authentication method works together for user's authentication in the network. Except for biometric authentication, most authentication methods can be copied, or someone else can adopt and abuse someone else's credential method. Thus, more than one authentication method must be used for user authentication. However, more credential makes system degrade and inefficient as they log on the system. Therefore, without tradeoff performance with efficiency, this research proposed user's behavior based authentication for secure communication, and it will improve to establish a secure and efficient communication.

Observable Behavior for Implicit User Modeling -A Framework and User Studies-

  • Kim, Jin-Mook;Oard, Douglas W.
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.35 no.3
    • /
    • pp.173-189
    • /
    • 2001
  • This paper presents a framework for observable behavior that can be used as a basis for user modeling, and it reports the results of a pair of user studies that examine the joint utility of two specific behaviors. User models can be constructed by hand, or they can be teamed automatically based on feedback provided by the user about the relevance of documents that they have examined. By observing user behavior, it is possible to obtain implicit feedback without requiring explicit relevance judgments. Four broad categories of potentially observable behavior are identified : examine, retain, reference, and annotate, and examples of specific behaviors within a category are further subdivided based on the natural scope of information objects being manipulated . segment object, or class. Previous studies using Internet discussion groups (USENET news) have shown reading time to be a useful source of implicit feedback for predicting a user's preferences. The experiments reported in this paper extend that work to academic and professional journal articles and abstracts, and explore the relationship between printing behavior and reading time. Two user studies were conducted in which undergraduate students examined articles or abstracts from the telecommunications or pharmaceutical literature. The results showed that reading time can be used to predict the user's assessment of relevance, that the mean reading time for journal articles and technical abstracts is longer than has been reported for USENET news documents, and that printing events provide additional useful evidence about relevance beyond that which can be inferred from reading time. The paper concludes with a brief discussion of the implications of the reported results.

  • PDF

Navigational Structure and User Behavior Modeling for Restructuring of Web-based Information Systems (웹기반 정보시스템의 재구성을 위한 항해구조 및 사용자행동 모델링)

  • 박학수;황성하;이강수
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.6
    • /
    • pp.730-744
    • /
    • 2002
  • A Web-Based Information System(WBIS), a typical structure of recently information systems, should be dynamically restructured in order to satisfy user's need and make a profit. Thus, we should analyze and modelize the navigational structure of WBIS and utilize it by modeling the navigational structure of behavior of user through log-file as system restructuring. In this paper, we propose the modeling method for navigational structure and user behavior to restructure WBIS including shopping mall. Also, we suggest the structural model, state transition model, Petri net model and analysis method and analyze and implement modeling algorithm for user behavior to analyze log-file of it. Then, we propose some restructuring heuristic and apply the methods to the example of WBIS.

  • PDF

Scheduling Management Agent using Bayesian Network based on Location Awareness (베이지안 네트워크를 이용한 위치인식 기반 일정관리 에이전트)

  • Yeon, Sun-Jung;Hwang, Hye-Jeong;Lee, Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.6
    • /
    • pp.712-717
    • /
    • 2011
  • Recently, diverse schedule management agents are being researched for the efficient schedule management of smart devices users, but they remain at a confirmatory level. In order to efficiently manage user's schedules, execution of planned schedules should be monitored to help users properly execute their schedules, or feedback must be given so that when setting up new schedules, users can plan their schedule according to their schedule establishment patterns. This research proposes a schedule management agent that infers the user's behaviors by using acquired user context, and provides schedule related feedback depending on the user's behavior patterns, when users are executing their schedules or planning new schedules. For this, collected user context information is preprocessed and user's behavior is inferred by Bayesian network. Also, in order to provide feedbacks necessary for confirming the user's schedule execution and new schedule establishment, a context tree pattern matching method for the user's schedule, location and time contexts was applied, then verified with 6 weeks of user simulation in a mobile environment.

Object Extraction and Modeling Method from the User Requirements with Fillmore's Case Grammar (Fillmore의 Case Grammar를 통한 사용자 요구사항으로부터 객체 추출 및 모델링 방법)

  • Ahn, Sung-Bin;Kim, Dong-Ho;Seo, Chae-Yun;Kim, R.Young-Chul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.10
    • /
    • pp.985-989
    • /
    • 2010
  • The near future smart ubiquitous computing oriented system will have to provide the optimal (right) service through interactions between users and the system. To provide the right services what the user needs, we should choose the user-centered development for reflecting the user needs, but not the developer-centered development. To do this, we proposed User Behavior Analysis Based Needs Extraction Method [1]. In this paper, we propose Object Extraction and Modeling Method from the user requirements with Fillmore's Case Grammar.

The structural relationships among user citizenship behavior, aberrant user behavior, social connectedness, privacy concern, and user satisfaction (SNS 이용자 시민행동, 불량행동, 사회적 유대감, 프라이버시 침해 우려 및 이용자 만족도간의 구조적 관계)

  • Kim, Yoo-Jung;Kim, Jae-Young;Han, Jae-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.4994-5004
    • /
    • 2012
  • This paper aims at investigating voluntary user participation such as user citizenship behavior and aberrant user behavior in the SNS context. Also it examines on how user participation behavior affects social connectedness, privacy concern, and user satisfaction. The empirical assessment of the research model was conducted using a total of 143 responses. The findings show that user citizenship behavior impacts on social connectedness positively and significantly whereas aberrant user behavior does not influence on social connectedness. Aberrant user behavior is proven not to be related to social connectedness, and to has positive relationship with concern for privacy invasion. Also, the results show that privacy concern is not associated with social connectedness. Finally, social connectedness is shown to be a key determinant of SNS user satisfaction whereas privacy concern is not related to user satisfaction.

A Study on User Behavior of Input Method for Touch Screen Mobile Phone (터치스크린 휴대폰 입력 방식에 따른 사용자 행태에 관한 연구)

  • Jun, Hye-Sun;Choi, Woo-Sik;Pan, Young-Hwan
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.173-178
    • /
    • 2008
  • Due to a rapid increase in demand for bigger-screen-equipped mobile phones in recent years, many big-name-manufactures have been releasing touch-screen-enabled devices. In this paper, various touch-screen-input methods have been summarized into 6 different categories. How? By tracing each user's finger print path, user's input pattern and behavior have been carefully recorded and analyzed. Through this analysis, what to be considered before designing UI is presented in great details.

  • PDF

User Identification Using Real Environmental Human Computer Interaction Behavior

  • Wu, Tong;Zheng, Kangfeng;Wu, Chunhua;Wang, Xiujuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3055-3073
    • /
    • 2019
  • In this paper, a new user identification method is presented using real environmental human-computer-interaction (HCI) behavior data to improve method usability. User behavior data in this paper are collected continuously without setting experimental scenes such as text length, action number, etc. To illustrate the characteristics of real environmental HCI data, probability density distribution and performance of keyboard and mouse data are analyzed through the random sampling method and Support Vector Machine(SVM) algorithm. Based on the analysis of HCI behavior data in a real environment, the Multiple Kernel Learning (MKL) method is first used for user HCI behavior identification due to the heterogeneity of keyboard and mouse data. All possible kernel methods are compared to determine the MKL algorithm's parameters to ensure the robustness of the algorithm. Data analysis results show that keyboard data have a narrower range of probability density distribution than mouse data. Keyboard data have better performance with a 1-min time window, while that of mouse data is achieved with a 10-min time window. Finally, experiments using the MKL algorithm with three global polynomial kernels and ten local Gaussian kernels achieve a user identification accuracy of 83.03% in a real environmental HCI dataset, which demonstrates that the proposed method achieves an encouraging performance.

정보 시스템 최종 사용자의 피드백 탐색 행위와 합목적적 정보 시스템 활용;중소기업을 대상으로 한 실증적 연구

  • Sin, Yeong-Mi;Lee, Ju-Ryang;Lee, Ho-Geun
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.527-535
    • /
    • 2007
  • The number of SMEs taking up information systems such as Enterprise Resource Planning has been growing rapidly, and many of those organizations have stepped into the stage of ongoing use at this point. Thus, research which takes into account idiosyncratic nature of SME environment is more important than before. Through an empirical study using survey method, we tried to examine the importance of end user's feedback seeking behavior in SMEs and how environmental factors affecting such behavior reinforce and interact with the feedback seeking behavior itself. The result shows that end user's active role as a voluntary feedback seeker is important in utilizing information systems in accordance with the initial design intention in ongoing use environment. Furthermore, in order to facilitate such feedback seeking behavior in SME environment, it is essential that management's involvement and communicating to its employees the importance of effectively utilizing the information systems as well as the support of peer IT champ.

  • PDF