Definitions of Smartphone Security Strategies by SVM Based Market Segmentation and Hybrid MCDM Methods

碩士 === 國立清華大學 === 通訊工程研究所 === 104 === Due to the mobile communication devices with convenience, positioning and mobility features, smartphones are becoming essential part of the communication system in human life. Therefore, the information security of smartphone grows with each passing day. Even th...

Full description

Bibliographic Details
Main Authors: Pai, Fu Nien, 白傅年
Other Authors: Chang, Shih Yu
Format: Others
Language:zh-TW
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/36699617565383673977
id ndltd-TW-104NTHU5650118
record_format oai_dc
spelling ndltd-TW-104NTHU56501182017-08-27T04:30:36Z http://ndltd.ncl.edu.tw/handle/36699617565383673977 Definitions of Smartphone Security Strategies by SVM Based Market Segmentation and Hybrid MCDM Methods 以基於支援向量機之市場區隔與混合多準則決策分析法定義智慧型手機資訊安全策略 Pai, Fu Nien 白傅年 碩士 國立清華大學 通訊工程研究所 104 Due to the mobile communication devices with convenience, positioning and mobility features, smartphones are becoming essential part of the communication system in human life. Therefore, the information security of smartphone grows with each passing day. Even though there are some scholars probed for smartphones information security problems. But researchers rare for using market segmentation to analysis the difference between customer behaviors, moreover, discussion about smartphone information security and its solution projects further. In order to work out this problem, this research first based on questionnaires to investigate smartphone usage behaviors, and according the support vector machine (SVM) method to cluster, which based on users mode as market segmentation. Through market segmentation, the principal component analysis (PCA) that induce and simplify each market segment’s customers characteristic. Through the way of the PCA method, using the rough set theory (RST) to conclude the rules with affected influencing smartphone usage behaviors. Next, this research takes the decision making trial and evaluation laboratory (DEMATEL) method to construct the causal relationship among the criteria. In view of the DEMATEL method, construct customer characteristics influence relationship map (IRM) diagram for each segment. The analytic network process (ANP) generates the relation diagram on account of the analysis framework by IRM. To infer the weight mapping to each criterion, collecting expert opinions and general questionnaires simultaneously. In the light of expert opinions and general questionnaires, this can produce security strategies of each market separation by client actions. Stand on the results of this research, this research will provide substantial suggestion consulted for smartphone antivirus softwares. Chang, Shih Yu 張適宇 2016 學位論文 ; thesis 221 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立清華大學 === 通訊工程研究所 === 104 === Due to the mobile communication devices with convenience, positioning and mobility features, smartphones are becoming essential part of the communication system in human life. Therefore, the information security of smartphone grows with each passing day. Even though there are some scholars probed for smartphones information security problems. But researchers rare for using market segmentation to analysis the difference between customer behaviors, moreover, discussion about smartphone information security and its solution projects further. In order to work out this problem, this research first based on questionnaires to investigate smartphone usage behaviors, and according the support vector machine (SVM) method to cluster, which based on users mode as market segmentation. Through market segmentation, the principal component analysis (PCA) that induce and simplify each market segment’s customers characteristic. Through the way of the PCA method, using the rough set theory (RST) to conclude the rules with affected influencing smartphone usage behaviors. Next, this research takes the decision making trial and evaluation laboratory (DEMATEL) method to construct the causal relationship among the criteria. In view of the DEMATEL method, construct customer characteristics influence relationship map (IRM) diagram for each segment. The analytic network process (ANP) generates the relation diagram on account of the analysis framework by IRM. To infer the weight mapping to each criterion, collecting expert opinions and general questionnaires simultaneously. In the light of expert opinions and general questionnaires, this can produce security strategies of each market separation by client actions. Stand on the results of this research, this research will provide substantial suggestion consulted for smartphone antivirus softwares.
author2 Chang, Shih Yu
author_facet Chang, Shih Yu
Pai, Fu Nien
白傅年
author Pai, Fu Nien
白傅年
spellingShingle Pai, Fu Nien
白傅年
Definitions of Smartphone Security Strategies by SVM Based Market Segmentation and Hybrid MCDM Methods
author_sort Pai, Fu Nien
title Definitions of Smartphone Security Strategies by SVM Based Market Segmentation and Hybrid MCDM Methods
title_short Definitions of Smartphone Security Strategies by SVM Based Market Segmentation and Hybrid MCDM Methods
title_full Definitions of Smartphone Security Strategies by SVM Based Market Segmentation and Hybrid MCDM Methods
title_fullStr Definitions of Smartphone Security Strategies by SVM Based Market Segmentation and Hybrid MCDM Methods
title_full_unstemmed Definitions of Smartphone Security Strategies by SVM Based Market Segmentation and Hybrid MCDM Methods
title_sort definitions of smartphone security strategies by svm based market segmentation and hybrid mcdm methods
publishDate 2016
url http://ndltd.ncl.edu.tw/handle/36699617565383673977
work_keys_str_mv AT paifunien definitionsofsmartphonesecuritystrategiesbysvmbasedmarketsegmentationandhybridmcdmmethods
AT báifùnián definitionsofsmartphonesecuritystrategiesbysvmbasedmarketsegmentationandhybridmcdmmethods
AT paifunien yǐjīyúzhīyuánxiàngliàngjīzhīshìchǎngqūgéyǔhùnhéduōzhǔnzéjuécèfēnxīfǎdìngyìzhìhuìxíngshǒujīzīxùnānquáncèlüè
AT báifùnián yǐjīyúzhīyuánxiàngliàngjīzhīshìchǎngqūgéyǔhùnhéduōzhǔnzéjuécèfēnxīfǎdìngyìzhìhuìxíngshǒujīzīxùnānquáncèlüè
_version_ 1718520202777329664