• 제목/요약/키워드: Business Talk

검색결과 80건 처리시간 0.026초

Web-based Distribute Control Networks

  • Kiwon Song;Kim, Jonghwi;Park, Gi-Sang;Park, Gi-Heung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.82.4-82
    • /
    • 2001
  • Requirements for device control networks differ greatly from those of data (business) networks. Consequently, any control network which uses a filedbus protocol is, in general, different from If network protocol TCP/IP. One then needs to integrate both fieldbus protocol and TCP/IP to realize distributed control over IP network or internet. LonWorks technology provides networked intelligent I/O and controllers which make it a powerful, expandable solution. Connecting these remote Lon Works networks to the Internet can provide a powerful, integrated, distributed control system. This paper suggests a basic concept that be applied to distributed control over IP network or internet. Specially, Lonworks technology that used LonTalk protocol is reviewed as device network and ...

  • PDF

Editor's Note Response to Friedman's "The World Before Corona and the World After": A Perspective Raging From the Development of Civilization to the Harmony of East and West, and the Paradigm Shift

  • Park, Han Woo;Chung, Sae Won
    • Journal of Contemporary Eastern Asia
    • /
    • 제19권2호
    • /
    • pp.169-178
    • /
    • 2020
  • Thomas L. Friedman's "Our New Historic Divide: B.C. and A.C. ― The World Before Corona and the World After" column is becoming the talk of the times. Whoever talks about the post-Corona world mentions "BC/AC" as a new concept. However, people seem to be overusing the term "BC/AC" while overlooking the specific context that Friedman emphasized. So, taking into account the cultural differences and contexts of the East and the West highlighted in Friedman's column, we devised the "BC/AC" ten-paradigm hypothesis. We hope these ten cultural shifts will be the first step in examining the post-Corona world.

A Customer Value Theory Approach to the Engagement with a Brand: The Case of KakaoTalk Plus in Korea

  • So-Hyun Lee;ji-eun Lee;Hee-Woong Kim
    • Asia pacific journal of information systems
    • /
    • 제28권1호
    • /
    • pp.36-60
    • /
    • 2018
  • As an increasing number of people gained access to social network services (SNS), organizations started to use SNS as a channel for marketing and promotional purposes. The online advertising market has significant growth potential. Brand engagement is a key motive for online advertising, but how SNS users engage with brands, particularly in terms of the promotion of organizations, is poorly understood. This study uses customer value theory to examine brand engagement of users in terms of promoting companies in the context of Korean SNS marketing. This study identifies the antecedents of brand engagement based on customer value theory. Our findings show the significance of three factors of SNS marketing, namely, price discount, relationship support, and convenience, on brand engagement. We further show the consequences of brand engagement, namely, purchase decisions and word-of-mouth activities. These findings help advance customer value theory and offer practical insights into the use of information systems and marketing in the context of SNS.

Psychological contract-based Consumer Repurchase behavior On Social commerce platform: An Empirical study

  • Shahbaz, Hussain;Li, Ying;Li, Wenli
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권5호
    • /
    • pp.2061-2083
    • /
    • 2020
  • Social commerce, integration of social media and e-commerce, provides potential opportunities for consumers to talk about their ideas and exchange product-related information on online shopping platforms. Given the substantial prospects related to business opportunities and consumers' perceptions, this study explores the factors driving fulfillment of the psychological contract in social commerce platforms. This research proposes, examines, and proves a theoretical model for the post-purchase behavior of the consumers, through an empirical investigation of online questionnaire-based data, gathered from 367 consumers in a cross-sectional setting. Results show that the fulfillment of psychological contract, consumer loyalty, and affective commitment fully mediate the impact of consumer trust on platform and repurchase intention. The level of commitment toward the consumer by the platform is strongly related to the degree of consumer trust, which is reciprocated through re-purchase intentions. This study offers essential theoretical implications with regards to the social exchange theory, attribution theory, and an moderating effect of the platform empathy on consumers' trust-psychological contract fulfillment relationship. Likewise, this research has significant implications for practitioners and managers.

Research on Ontology Constructing by Delphi Technique (with Modeling Micheogul Tourist Resort)

  • Kim, Young-Ick;Kim, Min-Cheol;Kang, Han-Seop
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 2005년도 e-Biz World Conference 2005
    • /
    • pp.286-292
    • /
    • 2005
  • Continual attempt to accumulate and apply information eventually gives birth to the concept of the 'Semantic Web'. Thus, the 'Semantic Web' can be defined as a product of mankind's desire to standardize information. A term of knowledge is used as information or data in computer science. These are regarded and are divided sometimes each other in terminologies that have similar meaning. If it is divided, knowledge is different from information. However, some kind of information in Knowledge Representation is called knowledge often if it can be expressed in computing system. Therefore, knowledge representation can talk as information representation. The purpose of the study is systematizing knowledge through knowledge representation that uses Delphi technique and ontology is designed by utilizing assistance editor called protege-2000 to construct semantic web environment's ontology. Level of interest regarding the construction and evaluation of search systems based on ontology is set to increase. If defined well, semantic can reflect human's thinking to knowledge information on web. Furthermore systematizes knowledge, search of information and comprehension about Jeju tour using present computer may be done intelligence.

  • PDF

보안성이 향상된 화상회의 시스템 구축을 위한 영상 암호화에 관한 연구 (A Study on the Image Encryption for Video Conference System Construction that Security Improves)

  • 김형균;김단환;오무송
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2002년도 춘계종합학술대회
    • /
    • pp.631-634
    • /
    • 2002
  • 화상회의를 실행함에 있어서 중요한 회의 내용의 유출, 도용 등이 발생할 수 있기 때문에 보안성이 확보된 화상회의 시스템에 관한 연구가 계속되고 있다. 본 연구에서는 화상회의 시스템의 보안성에 대한 문제점을 해결하기 위하여 현재 사용되고 있는 사용자 인증과 같은 일반적인 암호화 기법 이외에 화상정보의 변조와 유출, 도용 등을 방지하기 위하여 영상을 암호화 하는 기법에 대하여 연구하였다, 영상 정보를 암호화하기 위해서 개선된 Vernam의 암호화 기법을 이용하였으며, 보다 안전한 화상회의 시스템을 구축하기 위하여 영상 분할 기법을 이용하여 화상을 여러 개의 모듈로 분할한 후 각각의 모듈로 암호를 합성하는 방법을 제안하였다.

  • PDF

안전한 화상회의 시스템을 위한 영상암호화 (Image Cryptography for Secure Video Conference System)

  • 고석만;오무송
    • 한국정보통신학회논문지
    • /
    • 제6권1호
    • /
    • pp.70-75
    • /
    • 2002
  • 화상회의 시스템은 원거리에 있는 사람들이 한자리에 모여서 이야기함으로 발생될 수 있는 시간적, 공간적 제약을 제거함으로써 정보전달과 업무처리의 신속성을 이끌어 낼 수 있다. 그러나 화상회의를 실행함에 있어서 중요한 회의 내용의 유출, 도용 등이 발생할 수 있기 때문에 안전성이 확보된 화상회의 시스템에 관한 연구가 계속되고 있다. 본 연구에서는 화상회의 시스템의 안정성에 대한 문제점을 해결하기 위하여 현재 사용되고 있는 사용자 인증과 같은 일반적인 암호화 기법 이외에 화상정보의 변조와 유출, 도용 등을 방지하기 위하여 영상 정보를 암호화 하는 기법에 대하여 연구하였다. 영상 정보를 암호화하기 위해서 개선된 Vernam의 암호화 기법을 이용하였으며, 보다 안전한 화상회의 시스템을 구축하기 위하여 영상 분할 통신 기법을 이용하여 화상을 여러 개의 모듈로 분할한 후 각각의 모듈별로 암호를 합성하는 방법을 제안하였다.

Privacy-Preserving in the Context of Data Mining and Deep Learning

  • Altalhi, Amjaad;AL-Saedi, Maram;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.137-142
    • /
    • 2021
  • Machine-learning systems have proven their worth in various industries, including healthcare and banking, by assisting in the extraction of valuable inferences. Information in these crucial sectors is traditionally stored in databases distributed across multiple environments, making accessing and extracting data from them a tough job. To this issue, we must add that these data sources contain sensitive information, implying that the data cannot be shared outside of the head. Using cryptographic techniques, Privacy-Preserving Machine Learning (PPML) helps solve this challenge, enabling information discovery while maintaining data privacy. In this paper, we talk about how to keep your data mining private. Because Data mining has a wide variety of uses, including business intelligence, medical diagnostic systems, image processing, web search, and scientific discoveries, and we discuss privacy-preserving in deep learning because deep learning (DL) exhibits exceptional exactitude in picture detection, Speech recognition, and natural language processing recognition as when compared to other fields of machine learning so that it detects the existence of any error that may occur to the data or access to systems and add data by unauthorized persons.

Link Prediction in Bipartite Network Using Composite Similarities

  • Bijay Gaudel;Deepanjal Shrestha;Niosh Basnet;Neesha Rajkarnikar;Seung Ryul Jeong;Donghai Guan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권8호
    • /
    • pp.2030-2052
    • /
    • 2023
  • Analysis of a bipartite (two-mode) network is a significant research area to understand the formation of social communities, economic systems, drug side effect topology, etc. in complex information systems. Most of the previous works talk about a projection-based model or latent feature model, which predicts the link based on singular similarity. The projection-based models suffer from the loss of structural information in the projected network and the latent feature is hardly present. This work proposes a novel method for link prediction in the bipartite network based on an ensemble of composite similarities, overcoming the issues of model-based and latent feature models. The proposed method analyzes the structure, neighborhood nodes as well as latent attributes between the nodes to predict the link in the network. To illustrate the proposed method, experiments are performed with five real-world data sets and compared with various state-of-art link prediction methods and it is inferred that this method outperforms with ~3% to ~9% higher using area under the precision-recall curve (AUC-PR) measure. This work holds great significance in the study of biological networks, e-commerce networks, complex web-based systems, networks of drug binding, enzyme protein, and other related networks in understanding the formation of such complex networks. Further, this study helps in link prediction and its usability for different purposes ranging from building intelligent systems to providing services in big data and web-based systems.

모바일 인스턴트 메신저에 대한 신뢰, 이모티콘 사용 태도와 이모티콘 구매의도 사이의 구조적 관계: 카카오톡 사례 (The Structural Relationship among Trust in MIM, Attitude toward Emoticons, and the Intention to Purchase Emoticons in Kakao Talk)

  • 정보희;배정호
    • 한국콘텐츠학회논문지
    • /
    • 제16권10호
    • /
    • pp.311-325
    • /
    • 2016
  • 모바일 인스턴트 메신저를 통한 커뮤니케이션이 지닌 특성 중 하나인 이모티콘의 사용 비중은 최근 비약적으로 증가하며 관련 시장도 커지고 있다. 이처럼 모바일 인스턴트 메신저 내 이모티콘 시장 가치가 증대되고 있음에도 불구하고, 이에 대한 학문적 연구는 미흡한 실정이다. 본 연구는 이러한 학문적 간극(gap)을 메우고, 모바일 인스턴트 메신저 서비스 내 이모티콘 시장 확대를 위한 전략 방향을 제안하기 위해 수행되었다. 보다 구체적으로 본 연구는 국내 스마트폰 사용자들이 가장 많이 사용하고 있는 모바일 인스턴트 메신저 앱인 카카오톡을 대상으로 카카오톡 내 이모티콘 구매의도에 영향을 미치는 요인들에 대해 탐색해보고자 한다. 본 연구는 카카오톡 대학생 사용자 193명을 대상으로 설문조사를 통해 진행되었으며, 구조방정식 모형의 경로분석을 사용하여 가설 검증을 하였다. 분석 결과, 모바일 인스턴트 메신저에 대한 소비자의 지각된 혜택은 시스템 신뢰도에 양(+)의 영향을 주었고, 지각된 위험은 음(-)의 영향을 주었다. 또한 이모티콘에 대한 지각된 유용성과 플로우는 각각 이모티콘 사용태도에 양(+)의 영향을 주었다. 그리고 시스템 신뢰도와 이모티콘 사용태도는 이모티콘 구매의도에 각각 양(+)의 영향력을 주는 것으로 밝혀졌다. 본 연구는 게임이나 소셜 네트워크 서비스 등 다른 모바일 관련 서비스 컨텐츠에 비해 상대적으로 연구가 많이 진행되지 않은 모바일 인스턴트 메신저 내 이모티콘 구매에 대한 연구로서 구체적인 이론적, 실무적함의 역시 논하였다.