DOI QR코드

DOI QR Code

A Preference of Smartphone Locking Algorithms Using Delphi and AHP (Aanalytic Hierarchy Process)

델파이와 계층분석기법을 이용한 스마트폰 잠금 알고리즘 선호도 분석

  • Nam, Soo-Tai (Division of Information & Electronic Commerce, Wonkwang University) ;
  • Shin, Seong-Yoon (School of Computer Information & Communication Engineering, Kunsan National University) ;
  • Jin, Chan-Yong (Division of Information & Electronic Commerce, Wonkwang University)
  • Received : 2019.06.27
  • Accepted : 2019.08.08
  • Published : 2019.10.31

Abstract

Recently, a variety of algorithms using encryption technology have been adopted as methods of unlocking smartphone. It is advancing toward the direction to solve the unlocking problem through human biometrics technology, which has already succeeded in commercializing. These include finger print recognition, face recognition, and iris recognition. In this study, the evaluation items are five algorithms, including finger print recognition, face recognition, iris recognition, pattern recognition, and password input method. Based on the algorithms adopted, the AHP (analytic hierarchy process) technique was used to calculate the preferred priorities for smartphone users. Finger print recognition ( .400) was the top priority for smartphone users. Next, pattern recognition ( .237) was placed in the second priority for smartphone users. Therefore, based on the results of the analysis, the limitations of the study and theoretical implications are suggested.

최근 스마트폰 잠금 해제 방법에 암호화 기술을 이용한 다양한 알고리즘이 채택된 제품이 출시되고 있다. 이미 상용화에 성공한 인간의 생체인식 기술을 통해 해결하고자 하는 방향으로 진보해 나가고 있다, 이러한 기술에는 지문인식, 얼굴인식, 홍채인식 등이 여기에 속한다. 본 연구의 평가항목에는 지문인식, 얼굴인식, 홍채인식, 패턴인식 그리고 패스워드 입력방식 포함하여 5가지 알고리즘이다. 이렇게 채택된 알고리즘을 기준으로 AHP 기법을 이용하여 스마트폰 사용자들이 선호하는 우선순위를 분석하였다. 스마트폰 사용자가 가장 선호하는 우선순위 1위는 지문인식( .400)이 차지하였다. 다음으로 스마트폰 사용자가 선호하는 우선순위 2위는 패턴인식( .237)이 위치하였다. 따라서 분석결과를 바탕으로 연구의 한계와 이론적 실무적 시사점을 제시하였다.

Keywords

Acknowledgement

This paper was supported by Wonkwang university in 2019

References

  1. S. T. Nam, and C. Y. Jin, "Factors Influencing on Continuous Usage Intention of Smartphone Based on the TAM (Technology Acceptance Model)," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 11, pp. 2076-2082, Nov. 2017. https://doi.org/10.6109/jkiice.2017.21.11.2076
  2. S. T. Nam, and C. Y. Jin, "A Meta-Analysis of Relationship between Perceived Value, Risk and Behavioral Intention on E-Commerce," Asia-Pacific Journal of Business Venturing and Entrepreneurship, vol. 11, no. 4, pp. 179-189, Aug. 2016. https://doi.org/10.16972/apjbve.11.4.201608.179
  3. J. P. Martino, Technological Forecasting for Decision Making Book and Disk, Mcgraw Hill, Engineering and Technology Management Series, Oct. 1992.
  4. U. G. Gupta, and R. E. Clarke, "Theory and Applications of the Delphi Technique: A bibliography (1975-1994)," Technological Forecasting and Social Change, vol. 53, no. 2, pp. 185-211, Oct. 1996. https://doi.org/10.1016/S0040-1625(96)00094-7
  5. J. A. Kim, "A Study on the Applicability of Communitarianism for Maeul Mandelgie by the Delphi Method," The Korea Spatial Planning Review, vol. 83, no. 1, pp. 113-127, Dec. 2014. https://doi.org/10.15793/kspr.2014.83..008
  6. T. L. Satty, "Decision making with the analytic hierarchy process," Institute Journal Services Sciences, vol. 1, no. 1, pp. 83-98, Jan. 2008. https://doi.org/10.1504/IJSSCI.2008.017590
  7. S. T. Nam, C. Y. Jin, and D. G. Kim, "A Priority Analysis on Mobile Telecom Internet of Things Using the AHP (analytic hierarchy process)," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 6, pp. 1191-1196, Jun. 2017. https://doi.org/10.6109/jkiice.2017.21.6.1191
  8. J. S. Yoon, "Determining the Priority of Lifelong Education Promotion Policy in Gyeongsangnam-do through AHP Analysis," Journal of the Korea Contents Society, vol. 13, no. 5, pp. 520-521, May. 2013.
  9. Y. J. Cho, "An Analysis on Priority of Clothing Evaluative Criteria using AHP," Fashion and Textile Research Journal, vol. 9, no. 1, Jan. 2007.
  10. D. H. Youm, and A. Prakash, "Email Based Verification of Data Storage in Cloud Computing," Asia-pacific Journal of Convergent Research Interchange, vol. 2, no. 2, pp. 35-41, Jun. 2016. https://doi.org/10.21742/apjcri.2016.06.05
  11. S. D. Park, "Development of Safety Map Application for Local Residents," Journal of the Korea Institute of Information and Communication Engineering, vol. 23, no. 3, pp. 299-304, Mar. 2019. https://doi.org/10.6109/JKIICE.2019.23.3.299