• Title/Summary/Keyword: Distribution of Information Source Usage

Search Result 6, Processing Time 0.019 seconds

A Study on Copyright Usage Permission Platform Based on Blockchain for Distribution of Theme, Background and Signal Music (주제/배경/시그널 음원의 유통을 위한 블록체인 기반의 이용허락 플랫폼에 관한 연구)

  • Kim, Youngmo;Park, Byeongchan;Jang, Seyoung;Kim, Seok-Yoon
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.1
    • /
    • pp.18-24
    • /
    • 2021
  • The current settlement and distribution used in theme, background and signal music market other than conventional music is being carried out with either the comprehensive settlement method or the measured meter-rate settlement method in the payment process of collected user fees and compensation depending on the use-permission types. In this settlement and distribution process, however, the reliability issues are often being raised because of the difficulty of tracking rights due to changes in music source rights management information, etc, and the opaque settlement and distribution method itself. This paper proposes a new settlement and distribution platform using a blockchain for the reliable collection and distribution of copyright fees among music user group, monitoring organization group, trust organization group and copyright holders, based on the monitoring information of the theme, background and signal music usage. This platform also provides the transparency in settlement and distribution process among stakeholders through smart contract system.

The Distribution of Information Sources within the University Selection Decision-Making Process: A Longitudinal Study

  • LE, Tri D.;NGUYEN, Tan T.;NGUYEN, Phuong N.D.;NGUYEN, Thi Quynh Trang
    • Journal of Distribution Science
    • /
    • v.20 no.11
    • /
    • pp.89-98
    • /
    • 2022
  • Purpose: Increasing competition in the higher education sector has prompted universities to enhance their marketing efforts and understand their potential customers. The study aims to explore how information sources are used and changed among prospective Vietnamese students during the decision-making process. Research Design, Data, and Methodology: This study undertakes a longitudinal study involving multiple rounds of data collection to better understand the decision-making process of prospective students. Data was collected from 12th -grade students in Vietnam through two rounds of quantitative surveys with 251 students and one round of qualitative interviews, spanning the duration of their senior year. The three stages of the decision-making process correspond to the three stages of pre-purchase period. Results: Most students decide that attending open days, taking career assessments, and looking up information online are the most important information sources to consider. The WOM sources are more important in the early stages, while university-generated sources and events are important in the later stages. Conclusion: Implications from this study may contribute to the design of more effective marketing communications campaigns as university marketers gain a better understanding of the distribution of information sources utilized for each specific stage of the decision-making process.

The Effect of Media Richness, Social Presence, and Life Satisfaction on Continuance Usage Intention or Withdrawal Intention of SNS Users via Relative Deprivation (매체 풍요도, 사회적 존재감 및 생활 만족도가 상대적 박탈감을 통해 SNS 이용자의 이용 지속 의도 또는 이탈 의도에 미치는 영향)

  • Lee, Un-Kon
    • Journal of Distribution Science
    • /
    • v.14 no.10
    • /
    • pp.165-178
    • /
    • 2016
  • Purpose - This study aims to empirically verify the impact of media richness, social presence, and prior life satisfaction on various continual usage or withdrawal behaviors of SNS users via both a positive path of satisfaction and a negative path of relative deprivation. By identifying these causal paths, we observe dynamic interactions of SNS user psychology in a balanced view, and provide some implications about design principles for SNS providers. Research design, data, and methodology - We developed 16 hypothesis based on media richness theory, social presence theory, social comparison theory, the literature about relative deprivation, and the literature about the various reactions of IS users. The rich SNS media, social presence recognition among peer SNS users, and prior life satisfaction could generate positive experience, attitude, and virtuous behavioral intentions among SNS users. At the same time, rich media, low social presence, and low prior life satisfaction could generate relative deprivation and could increase withdrawal behavioral intentions such as refusal to provide information, misrepresentation of information, and removal of uploaded information in SNS. Scenario surveys were conducted to collect data from potential SNS users. Data from 357 surveys were collected and analyzed through a PLS algorithm to test the hypotheses. Results - Media richness, social presence, and prior life satisfaction could significantly increase perceived enjoyment, satisfaction, and behavioral intention of continual usage and knowledge sharing. They also could significantly decrease refusal and misrepresentation intention. Relative deprivation is significantly decreased only by prior life satisfaction. Relative deprivation could not significantly decrease satisfaction, but it could significantly increase misrepresentation and removal intention, which could be regarded as information distortion intention. Conclusions - SNS providers should focus on developing rich media and social presence support because these two variables could impact the positive experiences of SNS users. Moreover, the positive experiences could heavily influence SNS user behavior. Some management is needed to prevent relative deprivation and its consequences of misrepresentation and removal intention. SNS providers should prevent SNS users from excessive image misrepresentation and removal as this information distortion could be the source of relative deprivation.

An Examination of Customer Usage for Major Railway Station Buildings (주요 철도역사의 고객이용패턴 조사분석)

  • Lee, Jun-One;Bahn, Sang-Woo
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.698-705
    • /
    • 2008
  • Under the rapid change in environment of our society and culture, it is also called for a reform in railway management that has traditionally focused on transportation service. Thus developing a business model to use station buildings as a new source of profit has become a promising core business of railway companies. This study aims to find a way to maximize profits by strategically utilizing station buildings and thereby increasing accessibility to customers and consolidating facilities as a key service point. The subjects of this study include eight station buildings that can represent three types of railway stations including departure stations, junction stations, and metro stations. The researcher conducted an analysis on moving lines for examining user distribution and facility utilization within the selected buildings, a survey for collecting basic information on usage and measuring customer satisfaction of facility in the buildings, and a sight analysis to examine accessibility to the station buildings. On the basis of these analyses, the researcher examined the correlations between convenience, visibility, recognizability and functionality with regard to commerce, amenities, couches, direction boards, etc. within station waiting rooms. On the basis of the above analyses, the researcher provides a scheme to increase profitability in railway operation business and customer benefits of using station buildings by drawing up a plan to improve usage of station buildings and maximize profit-making potential for each category of station buildings.

  • PDF

An Adaptively Speculative Execution Strategy Based on Real-Time Resource Awareness in a Multi-Job Heterogeneous Environment

  • Liu, Qi;Cai, Weidong;Liu, Qiang;Shen, Jian;Fu, Zhangjie;Liu, Xiaodong;Linge, Nigel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.670-686
    • /
    • 2017
  • MapReduce (MRV1), a popular programming model, proposed by Google, has been well used to process large datasets in Hadoop, an open source cloud platform. Its new version MapReduce 2.0 (MRV2) developed along with the emerging of Yarn has achieved obvious improvement over MRV1. However, MRV2 suffers from long finishing time on certain types of jobs. Speculative Execution (SE) has been presented as an approach to the problem above by backing up those delayed jobs from low-performance machines to higher ones. In this paper, an adaptive SE strategy (ASE) is presented in Hadoop-2.6.0. Experiment results have depicted that the ASE duplicates tasks according to real-time resources usage among work nodes in a cloud. In addition, the performance of MRV2 is largely improved using the ASE strategy on job execution time and resource consumption, whether in a multi-job environment.

Enhanced Method for Preventing Malware by Detecting of Injection Site (악성코드 인젝션 사이트 탐지를 통한 방어효율 향상방안)

  • Baek, Jaejong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.7
    • /
    • pp.1290-1295
    • /
    • 2016
  • Recently, as mobile internet usage has been increasing rapidly, malware attacks through user's web browsers has been spreading in a way of social engineering or drive-by downloading. Existing defense mechanism against drive-by download attack mainly focused on final download sites and distribution paths. However, detection and prevention of injection sites to inject malicious code into the comprised websites have not been fully investigated. In this paper, for the purpose of improving defense mechanisms against these malware downloads attacks, we focus on detecting the injection site which is the key source of malware downloads spreading. As a result, in addition to the current URL blacklist techniques, we proposed the enhanced method which adds features of detecting the injection site to prevent the malware spreading. We empirically show that the proposed method can effectively minimize malware infections by blocking the source of the infection spreading, compared to other approaches of the URL blacklisting that directly uses the drive-by browser exploits.