• 제목/요약/키워드: User Response

Search Result 983, Processing Time 0.026 seconds

The Activity-Oriented Usability Model of Software

  • Koh, Seokha;Koh, You-Jeong
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.3
    • /
    • pp.17-28
    • /
    • 2018
  • In this paper, an activity-oriented usability model is proposed. The usability model contains two types of characteristics: special-type characteristics of usability and sub-characteristics of usability. Workability, study-ability, and playability are, but do not exhaust, examples of special-type characteristic of usability. They correspond to working, studying, and playing using the software product, respectively. They represent the goal of using and can overlap each other. They are usability too by themselves. Navigate-ability, data-prepare-ability, data-input-ability, response-wait-ability, output-examine-ability, and output-utilize-ability are typical examples of sub-characteristics of usability. They correspond to navigating, preparing data, inputting data, waiting response, examining output, and utilizing the output data, respectively. They are not usability by themselves. They constitute usability together as a group. Assessing is the fundamental and indispensable aspect of quality. Without assessing, the concept of quality has little practical value. Satisfaction, effectiveness, and efficiency are the most typical sub-characteristics of usability in existing quality models, which correspond to the evaluation criteria of usability. In the activity-oriented usability model, however, only the user's satisfaction is included: Satisfaction is regarded as the operational definition of usability in the user's view. As the result, usability can be interpreted as the 'goodness for using, which is evaluated by the user. 'Three fundamental principles regarding software quality models are proposed too in this paper: Principles of Parsimony, Cohesiveness, and Inheritance. Discussions illustrate well that typical existing usability models violate these basic principles. Many authors have tried to define general usability models which can be applied to most kinds of software. The dream of the general and universal usability model, however, may be an illusion. The activity-oriented usability model is expected to serve as a prototype from which specialized usability models can be derived.

A study on Motivation Factors and User Responses of Mods for PC Game and its Influences to Continuance Intention - Focusing on - (게임의 모드 이용 동기별 사용자 반응이 지속 사용 의도에 미치는 영향에 대한 연구)

  • Choi, Won-Bin;Chang, Byeng-Hee
    • Journal of Korea Game Society
    • /
    • v.21 no.4
    • /
    • pp.25-42
    • /
    • 2021
  • This study investigated motivation factors of mods and their influence on user response to analyze IS Continuance. The data of 610 players of who used mods was analyzed by a Post Acceptance Model of IS Continuance, followed by empirical results. As a result of SEM, the motive factor was divided into the 'Media characteristic', 'Content characteristic', and 'Situational characteristic'. The motive factors significantly affected user response of 'Perceived Usefulness', 'Satisfaction', and 'IS Continuance'; each motivation factors have different influence and 'Content characteristic' significantly affected the IS Continuance.

An efficient user authentication protocol for cloud computing environments (클라우드 컴퓨팅 환경에서 효과적인 사용자 인증 프로토콜)

  • Moon, Jeong-Kyung;Kim, Jin-Mook;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2353-2359
    • /
    • 2011
  • The request of Green-IT technology and recommend of computer hardware resource are increasing explosively. So, necessity of Cloud computing is increasing rapidly. Berkeley Univ. announced teens constituent that threat Cloud computing in 2009 and problem for user authentication should be solved as is urgentest among them. So, We wish to propose effective user authentication protocol in Cloud computing environment. Secure safety for user quotation through Kerberos's ticket issue that is existent representative user authentication techniques, and defined authentication procedure of two steps that flow user authentication and service authentication through PKI's. Is uncomplicated structurally more than efficiency for certification protocol and examination result about safety, existent PKI that propose and simplify achievement procedure and system configuration more than Kerberos and reduced response time.

Integrated Authentication Protocol of Financial Sector that Modified OAuth2.0 (OAuth2.0을 변형한 금융권 통합인증 프로토콜)

  • Jung, Kyu-Won;Shin, Hye-seong;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.373-381
    • /
    • 2017
  • Currently, various types of user authentication methods based on public certificates are used in domestic financial transactions. Such an authorized certificate method has a problem that a different security module must be installed every time a user connects an individual financial company to a web server. Also, the financial company relying on this authentication method has a problem that a new security module should be additionally installed for each financial institution whenever a next generation authentication method such as biometric authentication is newly introduced. In order to solve these problems, we propose an integrated authentication system that handles user authentication on behalf of each financial institution in financial transactions, and proposes an integrated authentication protocol that handles secure user authentication between user and financial company web server. The new authentication protocol is a modified version of OAuth2.0 that increases security and efficiency. It is characterized by performing a challenge-response protocol with a pre-shared secret key between the authentication server and the financial company web server. This gives users a convenient and secure Single Sign-On (SSO) effect.

A Study on VoiceXML Application of User-Controlled Form Dialog System (사용자 주도 폼 다이얼로그 시스템의 VoiceXML 어플리케이션에 관한 연구)

  • Kwon, Hyeong-Joon;Roh, Yong-Wan;Lee, Hyon-Gu;Hong, Hwang-Seok
    • The KIPS Transactions:PartB
    • /
    • v.14B no.3 s.113
    • /
    • pp.183-190
    • /
    • 2007
  • VoiceXML is new markup language which is designed for web resource navigation via voice based on XML. An application using VoiceXML is classified into mutual-controlled and machine-controlled form dialog structure. Such dialog structures can't construct service which provide free navigation of web resource by user because a scenario is decided by application developer. In this paper, we propose VoiceXML application structure using user-controlled form dialog system which decide service scenario according to user's intention. The proposed application automatically detects recognition candidates from requested information by user, and then system uses recognition candidate as voice-anchor. Also, system connects each voice-anchor with new voice-node. An example of proposed system, we implement news service with IT term dictionary, and we confirm detection and registration of voice-anchor and make an estimate of hit rate about measurement of an successive offer from information according to user's intention and response speed. As the experiment result, we confirmed possibility which is more freely navigation of web resource than existing VoiceXML form dialog systems.

An Efficient Exchange-Method of a User Profile for Adapted Contents Services (적응화된 콘텐츠 서비스를 위한 효율적인 사용자 프로파일 교환 방법)

  • Kim, Kyung-Sik;Lim, Jong-Hyun;Kim, Seung-Hoon;Lee, Jae-Dong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.1
    • /
    • pp.69-78
    • /
    • 2008
  • In this paper, we propose the effective exchange-method of a user profile for adapted contents services in the contents adaptation system. The profiles continuously exchange among the devices of contents adaption system for providing the adapted contents to a user. The profile should be also exchanged according to periodic, aperiodic, event, request and response. Consequently, a lot of network traffic occur and computing power require. Solving theses problem, the profile exchange research needs. we analyze creation information, exchange information, and exchange form of the profile information in contents adaptation system for effective profile exchange and define exchange procedure of the profile using the analyzed profile information. we also propose providing method of the profile configured information for decreasing profile processing time and user setting method for decreasing the number of profile transmission. As a result of performance evaluation, providing method of the profile configured information reduce 7% processing time and user setting method decrease the number of profile transmission are effective to exchange the profile.

User experience of responsive web on multi-device environment (멀티 디바이스 환경에서 반응형 웹의 사용자 경험)

  • Kang, Jae-Shin;Lee, Young-Ju
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.465-470
    • /
    • 2018
  • This study investigated how layouts can be arranged to improve the user experience in response to changes in the size of responsive webs in a multi - device environment. The layout elements of the responsive web are largely divided into a header, a main concept image, a main content, a sub-content, and a footer. As the screen becomes smaller, the use of drawers and the menu of the scrolling menus rather than the vertical menus will help improve the user experience. The main concept image should be consistent and not lose readability through the use of system fonts. The main content and the sub content should be prevented from being long in the vertical scroll, and the card UI, the table list and the grid list could be alternatively presented for this purpose. Another problem with vertical scrolling is that the placement of user-selectable menus, such as more or new content corrections, is helpful in improving the user experience.

Design and Implementation of Library Chatbot for Non-face-to-face Reference Services (비대면 참고정보서비스를 위한 도서관 챗봇 설계 및 구현 연구)

  • Yoo, Jiyoon
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.151-179
    • /
    • 2020
  • This study explores the potential of using a library chatbot to improve the non-face-to-face digital reference services for academic library users by designing and implementing a library chatbot. Through data analysis, user needs and library services were analyzed, and a scenario was designed by selecting an appropriate development method. For user-friendly interaction, the personality of the chatbot and user interface was designed to evaluate its usability. In addition, the accuracy was verified through the response accuracy evaluation and performance evaluation of the chatbot, and the effectiveness of the chatbot was evaluated through a user satisfaction survey. In order to manage the operation and maintain service quality, the chatbot is improved by monitoring user-chatbot conversations and reflecting user feedback. Based on these findings, recommendations for designing and implementing a library chatbot were made to help improve library reference services.

Efficient Masquerade Detection Based on SVM (SVM 기반의 효율적인 신분위장기법 탐지)

  • 김한성;권영희;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.91-104
    • /
    • 2003
  • A masquerader is someone who pretends to be another user while invading the target user's accounts, directories, or files. The masquerade attack is the most serious computer misuse. Because, in most cases, after securing the other's password, the masquerader enters the computer system. The system such as IDS could not detect or response to the masquerader. The masquerade detection is the effort to find the masquerader automatically. This system will detect the activities of a masquerader by determining that user's activities violate a profile developed for that user with his audit data. From 1988, there are many efforts on this topic, but the success of the offers was limited and the performance was unsatisfactory. In this report we propose efficient masquerade detection system using SVM which create the user profile.

A Study on Efficient User Management System of Combat System

  • Hee-Soo Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.7
    • /
    • pp.191-198
    • /
    • 2024
  • In this paper, we proposes a user management system for efficient operation of the combat system within naval ship. Recently, naval ships have seen performance enhancements through various sensors, features, and continuous system development. This progress in the system has led to an increase in multi-funstion consoles that can manipulate various sensors and features within naval ship, consequently increasing the number of operators for these consoles. Therefore, a user management system that can control and manage multi-function consoles and operators in real-time is necessary for efficient management within naval ship. This paper suggests a user management system that can effectively manage the real-time situation of users accessing multi-function consoles. Additionally, a parallelization method using GPUs to reduce the CPU workload in operating various functions of the combat system is proposed. The proposed user management system has shown a performance improvement where the response time decreased by approximately 82% and the occupancy reduced by approximately 20% compared to the method using CPUs.