CN102855130A - Client software classification method based on human needs - Google Patents

Client software classification method based on human needs Download PDF

Info

Publication number
CN102855130A
CN102855130A CN 201110180269 CN201110180269A CN102855130A CN 102855130 A CN102855130 A CN 102855130A CN 201110180269 CN201110180269 CN 201110180269 CN 201110180269 A CN201110180269 A CN 201110180269A CN 102855130 A CN102855130 A CN 102855130A
Authority
CN
China
Prior art keywords
software
divided
client software
groups
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201110180269
Other languages
Chinese (zh)
Inventor
袁艺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 201110180269 priority Critical patent/CN102855130A/en
Publication of CN102855130A publication Critical patent/CN102855130A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Electrically Operated Instructional Devices (AREA)

Abstract

The invention relates to a client software classification method based on human needs. The method includes first classifying various client software into five layers (system, safety, communication and entertainment, business and education, and science and creation) according to the human demand analysis theory of American psychologist Maslow, then determining the corresponding layers according to functions of the client software, conducting classification, and finally conducting classification again on contained software in each layer according to difference of application fields and specific characteristics of the software. The method grasps core essence of the client software, is comprehensive in range, clear in logic and capable of being applied in expanding mode, and is favorable for conducting integral safety evaluation and change trend prediction of a computer software system.

Description

A kind of client software sorting technique of the demand analysis based on the people
Technical field
What the present invention relates to is a kind of software classification method, particularly a kind of client software sorting technique of the demand analysis based on the people.
Background technology
Have at present a lot of a variety of client softwares to obtain application in various aspects such as people's work, study, life, amusements, they have given play to huge effect, have greatly promoted efficient or convenience.But along with being on the increase of amount of software, the risk of computer system is also increasing thereupon, and may there be certain leak in each software, and some is found, and some is not yet discovery also, and these leaks all may cause some bad consequence.Therefore, strengthening analysis and management, assessment risk, the strick precaution harm of client software have been become the task of top priority, also is one of present study hotspot of academia.Reach these targets, an important basic work is that software is reasonably classified.Enormous amount, miscellaneous client software are carried out after the rationally effectively classification, just can carry out targetedly venture analysis and strick precaution, and computer system carried out safety evaluation based on classification or level and then the trend were that can also carry out security.
A rational software classification method should satisfy following requirement: (1) is comprehensive; (2) meet logic; (3) can expand.Existing software classification method mainly is that the software of certain particular type is classified, such as intruding detection system software is classified according to features such as detection method, applying frequencies; P2P software is classified according to application characteristics such as the centrality of main Types, the index of service, network structures; Database is classified etc. according to the knowledge model of data-driven.These classification obviously have limitation very much, do not accomplish the integral body of client software is classified, and and follow-up computer system overall security assessment, prediction etc. can not link directly.
Summary of the invention
The object of the invention is to overcome deficiency of the prior art, a kind of scope is comprehensive, the client software sorting technique of clear logic expanded application but provide.
Technical scheme of the present invention specifically comprises the steps:
1., with reference to the people's of American Psychologist's Maas Lip river (Abraham Maslow) Demand Analysis Theory and Practice (thinking that people's demand is divided into five large levels: the demand of psychological need, demand for security, ownership and love, Esteem Needs and Self-actualization Needs), all kinds of client softwares are divided into five large levels: system (system), safety (Security), interchange and amusement (Communication ﹠amp; Leisure), commercial affairs and education (Business ﹠amp; Education), science and creation (Science ﹠amp; Creation).
2., determine its corresponding level according to the function of each client software, and sort out.
3., in each level, the software that comprises is carried out again subseries according to the difference of its application, specific features: " system " is divided into operating system (Operating system), utility (Utility software), driver (Device driver); " safely " is divided into confidentiality (Confidentiality), authorizes integrality (Authentication ﹠amp; Integrity), access control (Access control), detection (Detection); " exchanging and amusement " is divided into instant messaging (Synchronous Conferencing), non-instant messaging (Asynchronous Conferencing), social networks (Social networks), video/audio (Video/audio), drawing (Graphics), game (Games), file-sharing (File sharing); " commercial affairs and education " is divided into document reads and edit (Document reader and editor), management (Management), data storage (Data storage), professional application (Field application), educational applications (Education application), ecommerce (E-commerce), web search (Web searching); " science and creation " is divided into design (Designing), exploitation (Development), research (Research).
Basic point of departure of the present invention is: all software all is that the people develops, people are because there is certain demand just can remove to write certain software, therefore all software is all for certain demand that satisfies the people occurs, and the people is the basic reason that software occurs and develops.Therefore, also corresponding the variety classes of software just of the variety classes of people's demand.Classification based on to people's demand can realize the classification to software.When people's demand is classified, can use for reference famous Maslow's theory of hierarchy of need, this theory is a kind of theory of research human needs structure, the common law that has reflected to a certain extent human behavior and psychological activity proposes in " theory of human motivation " book of being delivered in nineteen forty-three by American Psychologist's Maas Lip river first.
The present invention has grasped the core essence of client software, therefore can realize rationally effectively classification.Based on this sorting technique, the client software of numerous and complicated can be divided into five succinct large levels, the weight of each level also can be determined with reference to the Demand Analysis Theory and Practice of Maas Lip river, after each software is carried out leak analysis, safety assessment, just can use for reference the thinking of analytical hierarchy process and carry out the assessment of security of system like this.Further, according to the data that survey, user behavior analysis etc. obtains, can analyze the variation tendency of the weight of each level, and then can realize the prediction to security of system.
Description of drawings
Accompanying drawing 1 is the client software classification schematic diagram based on people's demand analysis.
Embodiment
American Psychologist's Maas Lip river (Abraham Maslow) is divided into five large levels with people's demand: the demand of psychological need, demand for security, ownership and love, Esteem Needs and Self-actualization Needs, arranged to higher level by lower level successively.With reference to this theory, all kinds of client softwares by human development can be divided into five large levels: system (system), safety (Security), interchange and amusement (Communication ﹠amp; Leisure), commercial affairs and education (Business ﹠amp; Education), science and creation (Science ﹠amp; Creation), also be to be arranged to higher level by lower level, level correspondence more up higher demand levels.
Then investigate existing each client software, determine its corresponding level according to the function that it can be realized, be included into respectively among the five large levels.
Further investigate the software that comprises in each level, can carry out again subseries according to the difference of their applications, specific features.
(1) " system " is divided into operating system (Operating system, such as Microsoft windows, Linux, Mac OS X etc.), utility (Utility software, such as document management software, compressed software etc.) and driver (Device driver is such as video driver, printer driver etc.) three groups;
(2) " safely " is divided into confidentiality (Confidentiality is such as encryption software etc.), authorizes integrality (Authentication ﹠amp; Integrity is such as the numeral signature etc.), access control (Access control, as fire wall etc.) and detect (Detection is such as intruding detection system IDS, scanning software, antivirus software etc.) four groups;
(3) " exchanging and amusement " is divided into instant messaging (Synchronous Conferencing, such as MSN, QQ, netmeeting software etc.), non-instant messaging (Asynchronous Conferencing, such as Email, BBS etc.), social networks (Social networks, such as Web Community etc.), video/audio (Video/audio, such as media player, MP3 player etc.), drawing (Graphics, such as Photoshop etc.), game (Games, such as all kinds of trivial games and online big game) and file-sharing (File sharing is such as FTP, P2P software etc.) seven groups;
(4) " commercial affairs with education " being divided into document reads and edits (Document reader and editor, such as the Microsoft Office groupware, Adobe Reader etc.), management (Management, such as Project Management Software etc.), data storage (Data storage, such as types of databases, network hard disc etc.), professional application (Field application, such as all kinds of professional software Matlab, Autocad etc.), educational applications (Education application, such as Remote Courseware etc.), ecommerce (E-commerce, such as shopping at network, payment software etc.) and web search (Web searching is such as search engine etc.) seven groups;
(5) " science and creation " is divided into design (Designing, such as music making software, video production software etc.), the exploitation (Development, such as all kinds of programming softwares etc.), research (Research, as various numerical simulation analysis softwares etc.) three groups.

Claims (2)

1. the client software sorting technique based on people's demand analysis is characterized in that, comprises the steps: that (1) is divided into all kinds of client softwares first five large levels: system, safety, interchange and amusement, commercial affairs and education, science and creation; (2) determine its corresponding level according to the function of each client software, and sort out; (3) in each level, the software that comprises is carried out again subseries according to the difference of its application, specific features.
2. the client software sorting technique based on people's demand analysis is characterized in that, the again subseries in the described step (3) refers to: " system " is divided into operating system, utility and driver three groups; " safely " be divided into confidentiality, authorize integrality, access control and detection four groups; " exchanging and amusement " is divided into instant messaging, non-instant messaging, social networks, video/audio, drawing, game and file-sharing seven groups; To " commercial affairs with education " be divided into document read with edit, management, data storage, professional application, educational applications, ecommerce and web search seven groups; " science and creation " is divided into design, R and D three groups.
CN 201110180269 2011-06-29 2011-06-29 Client software classification method based on human needs Pending CN102855130A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110180269 CN102855130A (en) 2011-06-29 2011-06-29 Client software classification method based on human needs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110180269 CN102855130A (en) 2011-06-29 2011-06-29 Client software classification method based on human needs

Publications (1)

Publication Number Publication Date
CN102855130A true CN102855130A (en) 2013-01-02

Family

ID=47401744

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110180269 Pending CN102855130A (en) 2011-06-29 2011-06-29 Client software classification method based on human needs

Country Status (1)

Country Link
CN (1) CN102855130A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488487A (en) * 2013-09-26 2014-01-01 深圳市金立通信设备有限公司 Event reminding method and terminal
CN104598742A (en) * 2015-01-27 2015-05-06 国家电网公司 Applicable urban development need estimation method
CN107590673A (en) * 2017-03-17 2018-01-16 南方科技大学 user classification method and device
CN107590672A (en) * 2017-03-17 2018-01-16 南方科技大学 Recommendation method and device based on Maslow's hierarchy of needs
CN111224976A (en) * 2019-12-31 2020-06-02 厦门美域中央信息科技有限公司 Network application protocol library management method based on tree classification structure

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488487A (en) * 2013-09-26 2014-01-01 深圳市金立通信设备有限公司 Event reminding method and terminal
CN104598742A (en) * 2015-01-27 2015-05-06 国家电网公司 Applicable urban development need estimation method
CN107590673A (en) * 2017-03-17 2018-01-16 南方科技大学 user classification method and device
CN107590672A (en) * 2017-03-17 2018-01-16 南方科技大学 Recommendation method and device based on Maslow's hierarchy of needs
CN111224976A (en) * 2019-12-31 2020-06-02 厦门美域中央信息科技有限公司 Network application protocol library management method based on tree classification structure

Similar Documents

Publication Publication Date Title
Sullivan et al. Environmental activism, social networks and the internet
Lockton et al. Models of the user: Designers’ perspectives on influencing sustainable behaviour
Raftopoulos et al. How enterprises play: Towards a taxonomy for enterprise gamification
Sahlabadi et al. Detecting abnormal behavior in social network websites by using a process mining technique
CN102855130A (en) Client software classification method based on human needs
CN103902621A (en) Method and device for identifying network rumor
Yang et al. Measuring topic network centrality for identifying technology and technological development in online communities
Vasudevamurt et al. Serious game engines: Analysis and applications
Dai Designing an Accounting Information Management System Using Big Data and Cloud Technology
Arsenyan et al. Artificial intelligence research in management: A computational literature review
Cheng et al. Process and application of data mining in the university library
CN104111964A (en) User-read community application data processing method
Ma et al. Digital explosions and digital clones
Shi et al. Sustainability at the community level: A bibliometric journey around a set of sustainability‐related terms
Minchev et al. Information Processes and Threats in Social Networks: A Case Study
Jin et al. Effects of platformization strategy on continuance intention of mobile messaging apps
Cahier et al. Document and item-based modeling: a hybrid method for a socio-semantic web
Goodman et al. AHP (Analytic Hierarchy Process) and computer analysis software used in tourism safety
Cui et al. Perceiving group themes from collective social and behavioral information
Garces et al. Cybersecurity and Technology Convergence: Analysis of AI, Blockchain, and IoT Using SNA
Shade Civic Media: Technology, Design, Practice
Huang et al. Prediction of cascade structure and outbreaks recurrence in microblogs
Liu [Retracted] Group Relationship Mining of College Students Based on Predictive Social Network
Vrana et al. A network analysis of Greek tech blogs: A lonely road
Al-Shomar et al. A novel framework for remote management of social media big data analytics

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130102