• 제목/요약/키워드: Internet Business Model

Search Result 949, Processing Time 0.029 seconds

A Regression-Model-based Method for Combining Interestingness Measures of Association Rule Mining (연관상품 추천을 위한 회귀분석모형 기반 연관 규칙 척도 결합기법)

  • Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.127-141
    • /
    • 2017
  • Advances in Internet technologies and the proliferation of mobile devices enabled consumers to approach a wide range of goods and services, while causing an adverse effect that they have hard time reaching their congenial items even if they devote much time to searching for them. Accordingly, businesses are using the recommender systems to provide tools for consumers to find the desired items more easily. Association Rule Mining (ARM) technology is advantageous to recommender systems in that ARM provides intuitive form of a rule with interestingness measures (support, confidence, and lift) describing the relationship between items. Given an item, its relevant items can be distinguished with the help of the measures that show the strength of relationship between items. Based on the strength, the most pertinent items can be chosen among other items and exposed to a given item's web page. However, the diversity of the measures may confuse which items are more recommendable. Given two rules, for example, one rule's support and confidence may not be concurrently superior to the other rule's. Such discrepancy of the measures in distinguishing one rule's superiority from other rules may cause difficulty in selecting proper items for recommendation. In addition, in an online environment where a web page or mobile screen can provide a limited number of recommendations that attract consumer interest, the prudent selection of items to be included in the list of recommendations is very important. The exposure of items of little interest may lead consumers to ignore the recommendations. Then, such consumers will possibly not pay attention to other forms of marketing activities. Therefore, the measures should be aligned with the probability of consumer's acceptance of recommendations. For this reason, this study proposes a model-based approach to combine those measures into one unified measure that can consistently determine the ranking of recommended items. A regression model was designed to describe how well the measures (independent variables; i.e., support, confidence, and lift) explain consumer's acceptance of recommendations (dependent variables, hit rate of recommended items). The model is intuitive to understand and easy to use in that the equation consists of the commonly used measures for ARM and can be used in the estimation of hit rates. The experiment using transaction data from one of the Korea's largest online shopping malls was conducted to show that the proposed model can improve the hit rates of recommendations. From the top of the list to 13th place, recommended items in the higher rakings from the proposed model show the higher hit rates than those from the competitive model's. The result shows that the proposed model's performance is superior to the competitive model's in online recommendation environment. In a web page, consumers are provided around ten recommendations with which the proposed model outperforms. Moreover, a mobile device cannot expose many items simultaneously due to its limited screen size. Therefore, the result shows that the newly devised recommendation technique is suitable for the mobile recommender systems. While this study has been conducted to cover the cross-selling in online shopping malls that handle merchandise, the proposed method can be expected to be applied in various situations under which association rules apply. For example, this model can be applied to medical diagnostic systems that predict candidate diseases from a patient's symptoms. To increase the efficiency of the model, additional variables will need to be considered for the elaboration of the model in future studies. For example, price can be a good candidate for an explanatory variable because it has a major impact on consumer purchase decisions. If the prices of recommended items are much higher than the items in which a consumer is interested, the consumer may hesitate to accept the recommendations.

A Research on types of DMB advertising according to features of DMB Media (DMB의 미디어와 기술 특성에 따른 DMB광고 유형과 종류에 관한 연구)

  • Ahn, Jong-Bae
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.3 no.4
    • /
    • pp.59-88
    • /
    • 2008
  • For the success of the DMB market to meet consumers' demands for Ubiquitous Media and strengthen the nation's competitiveness, it's inevitable for us to activate DMB advertising as of main profit source for DMB Media, and to develop various types of DMB advertising which are linked to the profit model. So I'd like to look over the various types of DMB advertising which are suitable for DMB features as one of the efforts to activate DMB advertising. First of all, I've figured out what kinds of advertising are available for new media and which related technologies are required for DMB media. Through this research, I could find out what features of new media such as cable broadcasting, Internet and Mobile have become the source of developing various types of advertising and how to a great part to activate new media advertising markets by making the best use of their media features. This research also shows that DMB advertising has the high potential to be developed in various and effective types and kinds of advertising with its media feature and technological feature. This research observing DMB advertising cases showed that DMB advertising can be divided into 6 types such as forms, purposes, techniques, advertising positions, the use of LBS(Location Based Service), coupons and it could be developed into various kinds of DMB advertising dependent on each type. On the other hands, it would be great to have continual researches and follow-ups for various types of DMB advertising and the verification of the effectiveness for DMB advertising by performing potential DMB advertising.

  • PDF

The Task-Based Approach to Website Complexity and The Role of e-Tutor in e-Learning Process (e-러닝 학습자 만족을 이끄는 것은 무엇인가? 지각된 웹사이트 복잡성(Perceived Website Complexity)과 e-튜터(e-Tutor)의 역할)

  • Lee, Jae-Beom;Rho, Mi-Jung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.8
    • /
    • pp.2780-2792
    • /
    • 2010
  • In this study, we examine what components of e-learning environment affect e-learners' satisfaction. We focus on the task based approach to perceived website complexity(PWC). We study about the role of e-tutor using the internet, telephone, text message and e-mail etc. To test our model, we collected 235 data from online learners of Korea Culture & Content Agency using survey method. The research was conducted by SPSS15.0. Our results show that the relationship between PWC and e-learner satisfaction was negative. The rules of e-tutor are supporting e-learning service and facilitating recommendation intention. This study provides implications to design future e-learning service, understand user's herd behavior and evaluate learning process developed.

A Guideline for Identifying Blockchain Applications in Organizations (기업에서 요구되는 블록체인 애플리케이션 탐색을 위한 가이드라인)

  • Namn, Su Hyeon
    • Management & Information Systems Review
    • /
    • v.38 no.1
    • /
    • pp.83-101
    • /
    • 2019
  • Blockchain is considered as an innovative technology along with Artificial Intelligence, Big Data, and Internet of Things. However, since the inception of the genesis of blockchain technology, the cryptocurrency Bitcoin, the technology is not utilized widely, not let alone disruptive applications. Most of the blockchain research deals with the cryptocurrency, general descriptions of the technology such as trend, outlook of the technology, explanation of component technology, and so on. There are no killer applications like Facebook or Google, of course. Reflecting on the slow adoption by businesses, we wanted know about the current status of the research on blockchain in Korea. The main purpose of this paper is to help business practitioners to identify the application of blockchain to enhance the competitiveness of their organization. To do that, we first use the framework by Iansiti et al (2017) and categorize the blockchain related articles published in Korea according to the framework. This is to provide a benchmark or cases of other organizations' adoption of blockchain technology. Second, based on the value proposition of blockchain applications, we suggest evolutionary paths for adopting them. Third, from the demand pull perspective of technology adoption for innovation, we propose applicable areas where blockchain applications can be introduced. Fourth, we use the value chain model to find out the appropriate domains of blockchain applications in the corporate value chains. And the five competitive forces models is adopted to find ways of lowering the power of forces by incorporating blockchain technology.

Automatic Collection of Production Performance Data Based on Multi-Object Tracking Algorithms (다중 객체 추적 알고리즘을 이용한 가공품 흐름 정보 기반 생산 실적 데이터 자동 수집)

  • Lim, Hyuna;Oh, Seojeong;Son, Hyeongjun;Oh, Yosep
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.205-218
    • /
    • 2022
  • Recently, digital transformation in manufacturing has been accelerating. It results in that the data collection technologies from the shop-floor is becoming important. These approaches focus primarily on obtaining specific manufacturing data using various sensors and communication technologies. In order to expand the channel of field data collection, this study proposes a method to automatically collect manufacturing data based on vision-based artificial intelligence. This is to analyze real-time image information with the object detection and tracking technologies and to obtain manufacturing data. The research team collects object motion information for each frame by applying YOLO (You Only Look Once) and DeepSORT as object detection and tracking algorithms. Thereafter, the motion information is converted into two pieces of manufacturing data (production performance and time) through post-processing. A dynamically moving factory model is created to obtain training data for deep learning. In addition, operating scenarios are proposed to reproduce the shop-floor situation in the real world. The operating scenario assumes a flow-shop consisting of six facilities. As a result of collecting manufacturing data according to the operating scenarios, the accuracy was 96.3%.

The Effect of Market Orientation of Knowledge-Based Service Suppliers on the Sourcing Process of Service Recipients (지식기반서비스 공급자의 시장지향성이 수혜자의 소싱과정에 미치는 영향)

  • Noh, Jeonpyo
    • Asia Marketing Journal
    • /
    • v.8 no.1
    • /
    • pp.49-76
    • /
    • 2006
  • This study investigates the effect of market orientation of knowledge-based service suppliers on the sourcing process of service recipients. Focusing on a dyadic relationship between a supplier and a buyer, this study proposed a conceptual model of market orientation incorporating the antecedents and consequences of market orientation. This study empirically tested research hypotheses delineated from the conceptual framework. The present study revealed that the impact on the buyer's performance of the supplier's customer and competitor orientation turned out to be more influential than that of inter-departmental cooperation. Also these two dimensions of customer and competitor orientation played a positive role in reducing buyer's perceived risk and uncertainty related to the evaluation of services out-sourced. Interestingly enough, the supplier's perceived importance on the distance between the buyer and supplier remains important especially when the degree of buyer's market orientation is high. This finding is somewhat contrary to the fact that the geographic location of the buyer becomes less important for the internet-based B2B service providers. Based on the findings, this study suggested managerial implications and broadened the scope of academic research in the field of business services. Future research directions and the limitations of this study are also discussed.

  • PDF

Design and Implementation of MongoDB-based Unstructured Log Processing System over Cloud Computing Environment (클라우드 환경에서 MongoDB 기반의 비정형 로그 처리 시스템 설계 및 구현)

  • Kim, Myoungjin;Han, Seungho;Cui, Yun;Lee, Hanku
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.71-84
    • /
    • 2013
  • Log data, which record the multitude of information created when operating computer systems, are utilized in many processes, from carrying out computer system inspection and process optimization to providing customized user optimization. In this paper, we propose a MongoDB-based unstructured log processing system in a cloud environment for processing the massive amount of log data of banks. Most of the log data generated during banking operations come from handling a client's business. Therefore, in order to gather, store, categorize, and analyze the log data generated while processing the client's business, a separate log data processing system needs to be established. However, the realization of flexible storage expansion functions for processing a massive amount of unstructured log data and executing a considerable number of functions to categorize and analyze the stored unstructured log data is difficult in existing computer environments. Thus, in this study, we use cloud computing technology to realize a cloud-based log data processing system for processing unstructured log data that are difficult to process using the existing computing infrastructure's analysis tools and management system. The proposed system uses the IaaS (Infrastructure as a Service) cloud environment to provide a flexible expansion of computing resources and includes the ability to flexibly expand resources such as storage space and memory under conditions such as extended storage or rapid increase in log data. Moreover, to overcome the processing limits of the existing analysis tool when a real-time analysis of the aggregated unstructured log data is required, the proposed system includes a Hadoop-based analysis module for quick and reliable parallel-distributed processing of the massive amount of log data. Furthermore, because the HDFS (Hadoop Distributed File System) stores data by generating copies of the block units of the aggregated log data, the proposed system offers automatic restore functions for the system to continually operate after it recovers from a malfunction. Finally, by establishing a distributed database using the NoSQL-based Mongo DB, the proposed system provides methods of effectively processing unstructured log data. Relational databases such as the MySQL databases have complex schemas that are inappropriate for processing unstructured log data. Further, strict schemas like those of relational databases cannot expand nodes in the case wherein the stored data are distributed to various nodes when the amount of data rapidly increases. NoSQL does not provide the complex computations that relational databases may provide but can easily expand the database through node dispersion when the amount of data increases rapidly; it is a non-relational database with an appropriate structure for processing unstructured data. The data models of the NoSQL are usually classified as Key-Value, column-oriented, and document-oriented types. Of these, the representative document-oriented data model, MongoDB, which has a free schema structure, is used in the proposed system. MongoDB is introduced to the proposed system because it makes it easy to process unstructured log data through a flexible schema structure, facilitates flexible node expansion when the amount of data is rapidly increasing, and provides an Auto-Sharding function that automatically expands storage. The proposed system is composed of a log collector module, a log graph generator module, a MongoDB module, a Hadoop-based analysis module, and a MySQL module. When the log data generated over the entire client business process of each bank are sent to the cloud server, the log collector module collects and classifies data according to the type of log data and distributes it to the MongoDB module and the MySQL module. The log graph generator module generates the results of the log analysis of the MongoDB module, Hadoop-based analysis module, and the MySQL module per analysis time and type of the aggregated log data, and provides them to the user through a web interface. Log data that require a real-time log data analysis are stored in the MySQL module and provided real-time by the log graph generator module. The aggregated log data per unit time are stored in the MongoDB module and plotted in a graph according to the user's various analysis conditions. The aggregated log data in the MongoDB module are parallel-distributed and processed by the Hadoop-based analysis module. A comparative evaluation is carried out against a log data processing system that uses only MySQL for inserting log data and estimating query performance; this evaluation proves the proposed system's superiority. Moreover, an optimal chunk size is confirmed through the log data insert performance evaluation of MongoDB for various chunk sizes.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

Simultaneous Effect between eWOM and Revenues: Korea Movie Industry (온라인 구전과 영화 매출 간 상호영향에 관한 연구: 한국 영화 산업을 중심으로)

  • Bae, Jungho;Shim, Bum Jun;Kim, Byung-Do
    • Asia Marketing Journal
    • /
    • v.12 no.2
    • /
    • pp.1-25
    • /
    • 2010
  • Motion pictures are so typical experience goods that consumers tend to look for more credible information. Hence, movie audiences consider movie viewers' reviews more important than the information provided by the film distributor. Recently many portal sites allow consumers to post their reviews and opinions so that other people check the number of consumer reviews and scores before going to the theater. There are a few previous researches studying the electronic word of mouth(eWOM) effect in the movie industry. They found that the volume of eWOM influenced the revenue of the movie significantly but the valence of eWOM did not affect it much (Liu 2006). The goal of our research is also to investigate the eWOM effects in general. But our research is different from the previous studies in several aspects. First, we study the eWOM effect in Korean movie industry. In other words, we would like to check whether we can generalize the results of the previous research across countries. The similar econometric models are applied to Korean movie data that include 746,282 consumer reviews on 439 movies. Our results show that both the valence(RATING) and the volume(LNMSG) of the eWOM influence weekly movie revenues. This result is different from the previous research findings that the volume only influences the revenue. We conjectured that the difference of self construal between Asian and American culture may explain this difference (Kitayama 1991). Asians including Koreans have more interdependent self construal than American, so that they are easily affected by other people's thought and suggestion. Hence, the valence of the eWOM affects Koreans' choice of the movie. Second, we find the critical defect of the previous eWOM models and, hence, attempt to correct it. The previous eWOM model assumes that the volume of eWOM (LNMSG) is an independent variable affecting the movie revenue (LNREV). However, the revenue can influence the volume of the eWOM. We think that treating the volume of eWOM as an independent variable a priori is too restrictive. In order to remedy this problem, we employed a simultaneous equation in which the movie revenue and the volume of the eWOM can affect each other. That is, our eWOM model assumes that the revenue (LNREV) and the volume of eWOM (LNMSG) have endogenous relationship where they influence each other. The results from this simultaneous equation model showed that the movie revenue and the eWOM volume interact each other. The movie revenue influences the eWOM volume for the entire 8 weeks. The reverse effect is more complex. Both the volume and the valence of eWOM affect the revenue in the first week, but only the volume affect the revenue for the rest of the weeks. In the first week, consumers may be curious about the movie and look for various kinds of information they can trust, so that they use the both the quantity and quality of consumer reviews. But from the second week, the quality of the eWOM only affects the movie revenue, implying that the review ratings are more important than the number of reviews. Third, our results show that the ratings by professional critics (CRATING) had negative effect to the weekly movie revenue (LNREV). Professional critics often give low ratings to the blockbuster movies that do not have much cinematic quality. Experienced audiences who watch the movie for fun do not trust the professionals' ratings and, hence, tend to go for the low-rated movies by them. In summary, applied to the Korean movie ratings data and employing a simultaneous model, our results are different from the previous eWOM studies: 1) Koreans (or Asians) care about the others' evaluation quality more than quantity, 2) The volume of eWOM is not the cause but the result of the revenue, 3) Professional reviews can give the negative effect to the movie revenue.

  • PDF

A Study on the Influence of IT Education Service Quality on Educational Satisfaction, Work Application Intention, and Recommendation Intention: Focusing on the Moderating Effects of Learner Position and Participation Motivation (IT교육 서비스품질이 교육만족도, 현업적용의도 및 추천의도에 미치는 영향에 관한 연구: 학습자 직위 및 참여동기의 조절효과를 중심으로)

  • Kang, Ryeo-Eun;Yang, Sung-Byung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.169-196
    • /
    • 2017
  • The fourth industrial revolution represents a revolutionary change in the business environment and its ecosystem, which is a fusion of Information Technology (IT) and other industries. In line with these recent changes, the Ministry of Employment and Labor of South Korea announced 'the Fourth Industrial Revolution Leader Training Program,' which includes five key support areas such as (1) smart manufacturing, (2) Internet of Things (IoT), (3) big data including Artificial Intelligence (AI), (4) information security, and (5) bio innovation. Based on this program, we can get a glimpse of the South Korean government's efforts and willingness to emit leading human resource with advanced IT knowledge in various fusion technology-related and newly emerging industries. On the other hand, in order to nurture excellent IT manpower in preparation for the fourth industrial revolution, the role of educational institutions capable of providing high quality IT education services is most of importance. However, these days, most IT educational institutions have had difficulties in providing customized IT education services that meet the needs of consumers (i.e., learners), without breaking away from the traditional framework of providing supplier-oriented education services. From previous studies, it has been found that the provision of customized education services centered on learners leads to high satisfaction of learners, and that higher satisfaction increases not only task performance and the possibility of business application but also learners' recommendation intention. However, since research has not yet been conducted in a comprehensive way that consider both antecedent and consequent factors of the learner's satisfaction, more empirical research on this is highly desirable. With the advent of the fourth industrial revolution, a rising interest in various convergence technologies utilizing information technology (IT) has brought with the growing realization of the important role played by IT-related education services. However, research on the role of IT education service quality in the context of IT education is relatively scarce in spite of the fact that research on general education service quality and satisfaction has been actively conducted in various contexts. In this study, therefore, the five dimensions of IT education service quality (i.e., tangibles, reliability, responsiveness, assurance, and empathy) are derived from the context of IT education, based on the SERVPERF model and related previous studies. In addition, the effects of these detailed IT education service quality factors on learners' educational satisfaction and their work application/recommendation intentions are examined. Furthermore, the moderating roles of learner position (i.e., practitioner group vs. manager group) and participation motivation (i.e., voluntary participation vs. involuntary participation) in relationships between IT education service quality factors and learners' educational satisfaction, work application intention, and recommendation intention are also investigated. In an analysis using the structural equation model (SEM) technique based on a questionnaire given to 203 participants of IT education programs in an 'M' IT educational institution in Seoul, South Korea, tangibles, reliability, and assurance were found to have a significant effect on educational satisfaction. This educational satisfaction was found to have a significant effect on both work application intention and recommendation intention. Moreover, it was discovered that learner position and participation motivation have a partial moderating impact on the relationship between IT education service quality factors and educational satisfaction. This study holds academic implications in that it is one of the first studies to apply the SERVPERF model (rather than the SERVQUAL model, which has been widely adopted by prior studies) is to demonstrate the influence of IT education service quality on learners' educational satisfaction, work application intention, and recommendation intention in an IT education environment. The results of this study are expected to provide practical guidance for IT education service providers who wish to enhance learners' educational satisfaction and service management efficiency.