• Title/Summary/Keyword: User management

Search Result 6,189, Processing Time 0.033 seconds

The Development of User Interface Design Principles for Improving the Usability of University Course Management System (대학 강의지원시스템 이용성 향상을 위한 이용자 인터페이스 설계 원칙 개발)

  • Chae, Hyun-Soo;Lee, Jee-Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.29 no.3
    • /
    • pp.123-144
    • /
    • 2012
  • The study goal is to develop the user interface design principles to improve the usability of university course management systems. To achieve the goal, a usability study was conducted using a survey questionnaire and usability test. Eleven user interface design principles for university course management system were developed based on the usability study. This study has significance in that student opinions were incorporated directly into the user interface design principles of university course management system.

Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments (퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가)

  • Jin, Byungwook;Kim, Jonghwa;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

User Reputation Management Method Based on Analysis of User Activities on Social Media (소셜 미디어에서 사용자 행위 분석을 통한 사용자 평판 관리 기법)

  • Yun, Jinkyung;Jeong, Jiwon;Lee, Suji;Lim, Jongtae;Bok, Kyungsoo;Yoo, Jaesoo
    • Journal of KIISE
    • /
    • v.43 no.1
    • /
    • pp.96-105
    • /
    • 2016
  • Recently, social network services have changed by moving towards an open platform where, as well as simply allowing the building of relationships among users, various types of information can be generated and shared. Since existing user reputation management methods evaluate user reliability based on user profiles, explicit relations, and evaluation, they are not suitable for determining user reliability on social media due to few explicit evaluation. In this paper, we analyze social activities on social media and propose a new user reputation management method that considers implicit evaluation as well as explicit evaluation. The proposed method derives positive and negative implicit evaluation from social activities, and generates user reputation information by field in order to consider user expertise. It also considers the number of users that participate in evaluation in order to measure user influence. As a result, it generates the reputation information of users who have no explicit evaluation and creates user reputation information that is more suitable for social media.

Protection Management for Guaranteed User-Driven Virtual Circuit Services in Dynamic Multi-domain Environments: Design Issues and Challenges

  • Lim, Huhnkuk
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.369-379
    • /
    • 2015
  • Fault management of virtualized network environments using user-driven network provisioning systems (NPSs) is crucial for guaranteeing seamless virtual network services irrespective of physical infrastructure impairment. The network service interface (NSI) of the Open Grid Forum reflects the need for a common standard management API for the reservation and provisioning of user-driven virtual circuits (VCs) across global networks. NSI-based NPSs (that is, network service agents) can be used to compose user-driven VCs for mission-critical applications in a dynamic multi-domain. In this article, we first attempt to outline the design issues and challenges faced when attempting to provide mission-critical applications using dynamic VCs with a protection that is both user-driven and trustworthy in a dynamic multi-domain environment, to motivate work in this area of research. We also survey representative works that address inter-domain VC protection and qualitatively evaluate them and current NSI against the issues and challenges.

A Comprehensive Model for Measuring Information Systems Performance (포괄적인 정보시스템 성과평가모형에 관한 연구)

  • An Bong-Geun;Ju Ki-Jung;Kwon Hae-Ik
    • Korean Management Science Review
    • /
    • v.21 no.2
    • /
    • pp.111-122
    • /
    • 2004
  • Measuring performance of corporate information system has become one of the core issues in that development of the information system requires substantial amount of investments and the system works as a crucial leverage to enhance competitive edge. Most of the previous researches for performance of the information system have narrow and limited focus on such as the effect of user satisfaction and productivity. This paper suggests a model to measures the comprehensive performance which is classified as user scope (user involvement and satisfaction), operational scope (task productivity, task innovation, customer satisfaction, management control) and efficiency scope (financial performance), and to represent the relationship among the scopes by the path analysis model. Followings are conclusions from statistical hypothesis test of the model: (i) user involvement through user satisfaction has positive effect on all the performances in the operational scope, (ii) task innovation and customer satisfaction in the operational scope has statistically significant impact on financial performance but task productivity and management control do not. This conclusion indicates that task productivity and management control has the long term effect in nature, and evaluation of the information system has managerial implication when it Is measured in comprehensive performance which includes internal operational performances as well as financial performance.

An Investigation on Strategic Choice and Utilization of Information Systems Outsourcing (정보(情報)시스템 Outsourcing의 전략적(戰略的) 선택(選擇) 및 활용(活用)에 관한 연구(硏究))

  • Moon, Tae-Soo;Han, Kyong-Soo
    • Asia pacific journal of information systems
    • /
    • v.7 no.3
    • /
    • pp.39-59
    • /
    • 1997
  • This study presents the growth strategy of outsourcing service by finding out the differences of importance between user firms and system integration(SI) firms in Korean outsourcing business, The result of data analysis reveals that there are siginificant differences between user firms and SI firms in some components of information systems(IS) outsourcing services. User firms regarded integation of distributea data centers as the prominent issue of IS environment changes. Meanwhile, SI firms chose management of IS/VAN center, office automation(OA), and management of global network, as the more important issues in the application area of outsourcing. Among the merits of outsourcing, both of them considered cost reduction and IS flexibility as the most important factors, However, they chose the difficulty of management control and the lack of operation knowledge among the demerits of outsourcing, Also, they commonly selected overall IS consulting among the components of outsourcing diffusion. In the question of future outsourcing services, user firms chose the adoption of client/server architecture, while SI firms selected the application of multimedia. These results show that there are some differences of preference between user firms and SI firms. Most of user firms consider the outsourcing to maximize information utilization, while the service suppliers focus on new IT adoption and its application to organization. For the strategic use of outsourcing services, SI firms are required to establish the diffusion strategy to meet the outsourcing needs of user firms.

  • PDF

Management and Security of User in Linux Server (리눅스 서버의 사용자 관리 및 보안)

  • Jung, Sung-Jae;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.587-594
    • /
    • 2015
  • Open operating system, Linux is the traditional Web, E-mail, DNS, FTP server, as well as being used in Cloud and Big data infrastructure. In addition, Linux is also used like a desktop or mobile devices, smart TV and cars. In particular, stepping up to the IoT era at this time is expected to be greater proportion occupied by Linux. As the use of Linux has increased security has emerged as an important factor. User management is core of Linux system security. In this paper, Classifying Linux user and analyzed the role of the user-specific file. Finally, we analyzed the linux management technologies and useful user security tools.

Recommendation Algorithm based User Exercise Management System (추천 알고리즘 기반 사용자 운동 관리 시스템)

  • Lee, Jongwon;Lim, Hyunkeun;Kim, Hongyoul;Choi, Hyungwook;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.577-578
    • /
    • 2017
  • Existing exercise management systems provided exercise information to the user. However, there is a problem that the accuracy is low due to the absence of an algorithm for analyzing the user's body information and providing information. In this paper, BMI(Body Mass Index) and BMR(Basal Metabolic Rate) values are analyzed to analyze user's body information. It also recommends exercise intensity and momentum to the user and graphs the history of the exercise device that the user has used. Through this, it is considered that the information corresponding to the user's body can be provided and the exercise management can be carried out.

  • PDF

The Effect of the Writing Rules of Product User Guide on Consumer Accident Prevention (제품사용설명서의 작성원칙이 소비자의 제품사고예방에 미치는 영향)

  • Seo, JunHyeok;Bae, SungMin
    • Journal of Korean Society for Quality Management
    • /
    • v.47 no.3
    • /
    • pp.509-522
    • /
    • 2019
  • Purpose: The purpose of this study is to analyze how the writing rules of the product user guide affect consumers' understanding of products and the prevention of product accidents. Methods: We surveyed consumers to see how the writing rules of the product user guide help consumers to understand products and prevent product accidents. Results: We derived the importance, necessity, usability, and readability of the principle of making product manuals through analysis of previous research. Usability is the writing rule of the product user guide that the consumer has the most influence on the understanding of product use and the product accident. Conclusion: It is necessary to make product user guide so that consumers can understand the function and safety of products by using video and various image media. Also, It is the obligation to explain all stages of the product and to communicate through the product user guide how to prevent the product accident step by step.

End User Online Searching (최종이용자 온라인 탐색)

  • 장우권
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 1995.08a
    • /
    • pp.45-48
    • /
    • 1995
  • Since the early 1970s online searching has provided end-users with commercial and governmental bibliographic databases by trained intermediaries through the developed Vendor/Agency Systems. Recently, the situation has begun to change. The era of end-user searching is coming. End Users are the “information consumers” as the final user of an IT product or set of information. This study on end-user online searching is presented with the following aspects: development, characterization, training, end user online search services in university libraries, role of the intermediaries and librarians, the future.

  • PDF