CN102855130A - Client software classification method based on human needs - Google Patents
Client software classification method based on human needs Download PDFInfo
- Publication number
- CN102855130A CN102855130A CN 201110180269 CN201110180269A CN102855130A CN 102855130 A CN102855130 A CN 102855130A CN 201110180269 CN201110180269 CN 201110180269 CN 201110180269 A CN201110180269 A CN 201110180269A CN 102855130 A CN102855130 A CN 102855130A
- Authority
- CN
- China
- Prior art keywords
- software
- divided
- client software
- groups
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Electrically Operated Instructional Devices (AREA)
Abstract
The invention relates to a client software classification method based on human needs. The method includes first classifying various client software into five layers (system, safety, communication and entertainment, business and education, and science and creation) according to the human demand analysis theory of American psychologist Maslow, then determining the corresponding layers according to functions of the client software, conducting classification, and finally conducting classification again on contained software in each layer according to difference of application fields and specific characteristics of the software. The method grasps core essence of the client software, is comprehensive in range, clear in logic and capable of being applied in expanding mode, and is favorable for conducting integral safety evaluation and change trend prediction of a computer software system.
Description
Technical field
What the present invention relates to is a kind of software classification method, particularly a kind of client software sorting technique of the demand analysis based on the people.
Background technology
Have at present a lot of a variety of client softwares to obtain application in various aspects such as people's work, study, life, amusements, they have given play to huge effect, have greatly promoted efficient or convenience.But along with being on the increase of amount of software, the risk of computer system is also increasing thereupon, and may there be certain leak in each software, and some is found, and some is not yet discovery also, and these leaks all may cause some bad consequence.Therefore, strengthening analysis and management, assessment risk, the strick precaution harm of client software have been become the task of top priority, also is one of present study hotspot of academia.Reach these targets, an important basic work is that software is reasonably classified.Enormous amount, miscellaneous client software are carried out after the rationally effectively classification, just can carry out targetedly venture analysis and strick precaution, and computer system carried out safety evaluation based on classification or level and then the trend were that can also carry out security.
A rational software classification method should satisfy following requirement: (1) is comprehensive; (2) meet logic; (3) can expand.Existing software classification method mainly is that the software of certain particular type is classified, such as intruding detection system software is classified according to features such as detection method, applying frequencies; P2P software is classified according to application characteristics such as the centrality of main Types, the index of service, network structures; Database is classified etc. according to the knowledge model of data-driven.These classification obviously have limitation very much, do not accomplish the integral body of client software is classified, and and follow-up computer system overall security assessment, prediction etc. can not link directly.
Summary of the invention
The object of the invention is to overcome deficiency of the prior art, a kind of scope is comprehensive, the client software sorting technique of clear logic expanded application but provide.
Technical scheme of the present invention specifically comprises the steps:
1., with reference to the people's of American Psychologist's Maas Lip river (Abraham Maslow) Demand Analysis Theory and Practice (thinking that people's demand is divided into five large levels: the demand of psychological need, demand for security, ownership and love, Esteem Needs and Self-actualization Needs), all kinds of client softwares are divided into five large levels: system (system), safety (Security), interchange and amusement (Communication ﹠amp; Leisure), commercial affairs and education (Business ﹠amp; Education), science and creation (Science ﹠amp; Creation).
2., determine its corresponding level according to the function of each client software, and sort out.
3., in each level, the software that comprises is carried out again subseries according to the difference of its application, specific features: " system " is divided into operating system (Operating system), utility (Utility software), driver (Device driver); " safely " is divided into confidentiality (Confidentiality), authorizes integrality (Authentication ﹠amp; Integrity), access control (Access control), detection (Detection); " exchanging and amusement " is divided into instant messaging (Synchronous Conferencing), non-instant messaging (Asynchronous Conferencing), social networks (Social networks), video/audio (Video/audio), drawing (Graphics), game (Games), file-sharing (File sharing); " commercial affairs and education " is divided into document reads and edit (Document reader and editor), management (Management), data storage (Data storage), professional application (Field application), educational applications (Education application), ecommerce (E-commerce), web search (Web searching); " science and creation " is divided into design (Designing), exploitation (Development), research (Research).
Basic point of departure of the present invention is: all software all is that the people develops, people are because there is certain demand just can remove to write certain software, therefore all software is all for certain demand that satisfies the people occurs, and the people is the basic reason that software occurs and develops.Therefore, also corresponding the variety classes of software just of the variety classes of people's demand.Classification based on to people's demand can realize the classification to software.When people's demand is classified, can use for reference famous Maslow's theory of hierarchy of need, this theory is a kind of theory of research human needs structure, the common law that has reflected to a certain extent human behavior and psychological activity proposes in " theory of human motivation " book of being delivered in nineteen forty-three by American Psychologist's Maas Lip river first.
The present invention has grasped the core essence of client software, therefore can realize rationally effectively classification.Based on this sorting technique, the client software of numerous and complicated can be divided into five succinct large levels, the weight of each level also can be determined with reference to the Demand Analysis Theory and Practice of Maas Lip river, after each software is carried out leak analysis, safety assessment, just can use for reference the thinking of analytical hierarchy process and carry out the assessment of security of system like this.Further, according to the data that survey, user behavior analysis etc. obtains, can analyze the variation tendency of the weight of each level, and then can realize the prediction to security of system.
Description of drawings
Accompanying drawing 1 is the client software classification schematic diagram based on people's demand analysis.
Embodiment
American Psychologist's Maas Lip river (Abraham Maslow) is divided into five large levels with people's demand: the demand of psychological need, demand for security, ownership and love, Esteem Needs and Self-actualization Needs, arranged to higher level by lower level successively.With reference to this theory, all kinds of client softwares by human development can be divided into five large levels: system (system), safety (Security), interchange and amusement (Communication ﹠amp; Leisure), commercial affairs and education (Business ﹠amp; Education), science and creation (Science ﹠amp; Creation), also be to be arranged to higher level by lower level, level correspondence more up higher demand levels.
Then investigate existing each client software, determine its corresponding level according to the function that it can be realized, be included into respectively among the five large levels.
Further investigate the software that comprises in each level, can carry out again subseries according to the difference of their applications, specific features.
(1) " system " is divided into operating system (Operating system, such as Microsoft windows, Linux, Mac OS X etc.), utility (Utility software, such as document management software, compressed software etc.) and driver (Device driver is such as video driver, printer driver etc.) three groups;
(2) " safely " is divided into confidentiality (Confidentiality is such as encryption software etc.), authorizes integrality (Authentication ﹠amp; Integrity is such as the numeral signature etc.), access control (Access control, as fire wall etc.) and detect (Detection is such as intruding detection system IDS, scanning software, antivirus software etc.) four groups;
(3) " exchanging and amusement " is divided into instant messaging (Synchronous Conferencing, such as MSN, QQ, netmeeting software etc.), non-instant messaging (Asynchronous Conferencing, such as Email, BBS etc.), social networks (Social networks, such as Web Community etc.), video/audio (Video/audio, such as media player, MP3 player etc.), drawing (Graphics, such as Photoshop etc.), game (Games, such as all kinds of trivial games and online big game) and file-sharing (File sharing is such as FTP, P2P software etc.) seven groups;
(4) " commercial affairs with education " being divided into document reads and edits (Document reader and editor, such as the Microsoft Office groupware, Adobe Reader etc.), management (Management, such as Project Management Software etc.), data storage (Data storage, such as types of databases, network hard disc etc.), professional application (Field application, such as all kinds of professional software Matlab, Autocad etc.), educational applications (Education application, such as Remote Courseware etc.), ecommerce (E-commerce, such as shopping at network, payment software etc.) and web search (Web searching is such as search engine etc.) seven groups;
(5) " science and creation " is divided into design (Designing, such as music making software, video production software etc.), the exploitation (Development, such as all kinds of programming softwares etc.), research (Research, as various numerical simulation analysis softwares etc.) three groups.
Claims (2)
1. the client software sorting technique based on people's demand analysis is characterized in that, comprises the steps: that (1) is divided into all kinds of client softwares first five large levels: system, safety, interchange and amusement, commercial affairs and education, science and creation; (2) determine its corresponding level according to the function of each client software, and sort out; (3) in each level, the software that comprises is carried out again subseries according to the difference of its application, specific features.
2. the client software sorting technique based on people's demand analysis is characterized in that, the again subseries in the described step (3) refers to: " system " is divided into operating system, utility and driver three groups; " safely " be divided into confidentiality, authorize integrality, access control and detection four groups; " exchanging and amusement " is divided into instant messaging, non-instant messaging, social networks, video/audio, drawing, game and file-sharing seven groups; To " commercial affairs with education " be divided into document read with edit, management, data storage, professional application, educational applications, ecommerce and web search seven groups; " science and creation " is divided into design, R and D three groups.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201110180269 CN102855130A (en) | 2011-06-29 | 2011-06-29 | Client software classification method based on human needs |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201110180269 CN102855130A (en) | 2011-06-29 | 2011-06-29 | Client software classification method based on human needs |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102855130A true CN102855130A (en) | 2013-01-02 |
Family
ID=47401744
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 201110180269 Pending CN102855130A (en) | 2011-06-29 | 2011-06-29 | Client software classification method based on human needs |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102855130A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103488487A (en) * | 2013-09-26 | 2014-01-01 | 深圳市金立通信设备有限公司 | Event reminding method and terminal |
CN104598742A (en) * | 2015-01-27 | 2015-05-06 | 国家电网公司 | Applicable urban development need estimation method |
CN107590673A (en) * | 2017-03-17 | 2018-01-16 | 南方科技大学 | user classification method and device |
CN107590672A (en) * | 2017-03-17 | 2018-01-16 | 南方科技大学 | Recommendation method and device based on Maslow's hierarchy of needs |
CN111224976A (en) * | 2019-12-31 | 2020-06-02 | 厦门美域中央信息科技有限公司 | Network application protocol library management method based on tree classification structure |
-
2011
- 2011-06-29 CN CN 201110180269 patent/CN102855130A/en active Pending
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103488487A (en) * | 2013-09-26 | 2014-01-01 | 深圳市金立通信设备有限公司 | Event reminding method and terminal |
CN104598742A (en) * | 2015-01-27 | 2015-05-06 | 国家电网公司 | Applicable urban development need estimation method |
CN107590673A (en) * | 2017-03-17 | 2018-01-16 | 南方科技大学 | user classification method and device |
CN107590672A (en) * | 2017-03-17 | 2018-01-16 | 南方科技大学 | Recommendation method and device based on Maslow's hierarchy of needs |
CN111224976A (en) * | 2019-12-31 | 2020-06-02 | 厦门美域中央信息科技有限公司 | Network application protocol library management method based on tree classification structure |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sullivan et al. | Environmental activism, social networks and the internet | |
Lockton et al. | Models of the user: Designers’ perspectives on influencing sustainable behaviour | |
Raftopoulos et al. | How enterprises play: Towards a taxonomy for enterprise gamification | |
Sahlabadi et al. | Detecting abnormal behavior in social network websites by using a process mining technique | |
CN102855130A (en) | Client software classification method based on human needs | |
CN103902621A (en) | Method and device for identifying network rumor | |
Yang et al. | Measuring topic network centrality for identifying technology and technological development in online communities | |
Vasudevamurt et al. | Serious game engines: Analysis and applications | |
Dai | Designing an Accounting Information Management System Using Big Data and Cloud Technology | |
Arsenyan et al. | Artificial intelligence research in management: A computational literature review | |
Cheng et al. | Process and application of data mining in the university library | |
CN104111964A (en) | User-read community application data processing method | |
Ma et al. | Digital explosions and digital clones | |
Shi et al. | Sustainability at the community level: A bibliometric journey around a set of sustainability‐related terms | |
Minchev et al. | Information Processes and Threats in Social Networks: A Case Study | |
Jin et al. | Effects of platformization strategy on continuance intention of mobile messaging apps | |
Cahier et al. | Document and item-based modeling: a hybrid method for a socio-semantic web | |
Goodman et al. | AHP (Analytic Hierarchy Process) and computer analysis software used in tourism safety | |
Cui et al. | Perceiving group themes from collective social and behavioral information | |
Garces et al. | Cybersecurity and Technology Convergence: Analysis of AI, Blockchain, and IoT Using SNA | |
Shade | Civic Media: Technology, Design, Practice | |
Huang et al. | Prediction of cascade structure and outbreaks recurrence in microblogs | |
Liu | [Retracted] Group Relationship Mining of College Students Based on Predictive Social Network | |
Vrana et al. | A network analysis of Greek tech blogs: A lonely road | |
Al-Shomar et al. | A novel framework for remote management of social media big data analytics |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20130102 |