• Title/Summary/Keyword: Internet Negative

Search Result 698, Processing Time 0.026 seconds

An Analytical Approach Using Topic Mining for Improving the Service Quality of Hotels (호텔 산업의 서비스 품질 향상을 위한 토픽 마이닝 기반 분석 방법)

  • Moon, Hyun Sil;Sung, David;Kim, Jae Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.21-41
    • /
    • 2019
  • Thanks to the rapid development of information technologies, the data available on Internet have grown rapidly. In this era of big data, many studies have attempted to offer insights and express the effects of data analysis. In the tourism and hospitality industry, many firms and studies in the era of big data have paid attention to online reviews on social media because of their large influence over customers. As tourism is an information-intensive industry, the effect of these information networks on social media platforms is more remarkable compared to any other types of media. However, there are some limitations to the improvements in service quality that can be made based on opinions on social media platforms. Users on social media platforms represent their opinions as text, images, and so on. Raw data sets from these reviews are unstructured. Moreover, these data sets are too big to extract new information and hidden knowledge by human competences. To use them for business intelligence and analytics applications, proper big data techniques like Natural Language Processing and data mining techniques are needed. This study suggests an analytical approach to directly yield insights from these reviews to improve the service quality of hotels. Our proposed approach consists of topic mining to extract topics contained in the reviews and the decision tree modeling to explain the relationship between topics and ratings. Topic mining refers to a method for finding a group of words from a collection of documents that represents a document. Among several topic mining methods, we adopted the Latent Dirichlet Allocation algorithm, which is considered as the most universal algorithm. However, LDA is not enough to find insights that can improve service quality because it cannot find the relationship between topics and ratings. To overcome this limitation, we also use the Classification and Regression Tree method, which is a kind of decision tree technique. Through the CART method, we can find what topics are related to positive or negative ratings of a hotel and visualize the results. Therefore, this study aims to investigate the representation of an analytical approach for the improvement of hotel service quality from unstructured review data sets. Through experiments for four hotels in Hong Kong, we can find the strengths and weaknesses of services for each hotel and suggest improvements to aid in customer satisfaction. Especially from positive reviews, we find what these hotels should maintain for service quality. For example, compared with the other hotels, a hotel has a good location and room condition which are extracted from positive reviews for it. In contrast, we also find what they should modify in their services from negative reviews. For example, a hotel should improve room condition related to soundproof. These results mean that our approach is useful in finding some insights for the service quality of hotels. That is, from the enormous size of review data, our approach can provide practical suggestions for hotel managers to improve their service quality. In the past, studies for improving service quality relied on surveys or interviews of customers. However, these methods are often costly and time consuming and the results may be biased by biased sampling or untrustworthy answers. The proposed approach directly obtains honest feedback from customers' online reviews and draws some insights through a type of big data analysis. So it will be a more useful tool to overcome the limitations of surveys or interviews. Moreover, our approach easily obtains the service quality information of other hotels or services in the tourism industry because it needs only open online reviews and ratings as input data. Furthermore, the performance of our approach will be better if other structured and unstructured data sources are added.

The Building Plan of Online ADR Model related to the International Commercial Transaction Dispute Resolution (국제상거래 분쟁해결을 위한 온라인 ADR 모델 구축방안)

  • Kim Sun-Kwang;Kim Jong-Rack;Hong Sung-Kyu
    • Journal of Arbitration Studies
    • /
    • v.15 no.2
    • /
    • pp.3-35
    • /
    • 2005
  • The meaning of Online ADR lies in the prompt and economical resolution of disputes by applying the information/communication element (Internet) to existing ADR. However, if the promptness and economical efficiency are overemphasized, the fairness and appropriateness of dispute resolution may be compromised and consequently Online ADR will be belittled and criticized as second-class trials. In addition, as communication is mostly made using texts in Online ADR it is difficult to investigate cases and to create atmosphere and induce dynamic feelings, which are possible in the process of dispute resolution through face-to-face contact. Despite such difficulties, Online ADR is expanding its area not only in online but also in offline due to its advantages such as promptness, low expenses and improved resolution methods, and is expected to develop rapidly as the electronic government decided to adopt it in the future. Accordingly, the following points must be focused on for the continuous First, in the legal and institutional aspects for the development of Online ADR, it is necessary to establish a framework law on ADR. A framework law on ADR comprehending existing mediation and arbitration should be established and it must include contents of Online ADR, which utilizes electronic communication means. However, it is too early to establish a separate law for Online ADR because Online ADR must develop based on the theoretical system of ADR. Second, although Online ADR is expanding rapidly, it may take time to be settled as a tool of dispute resolution. As discussed earlier, additionally, if the amount of money in dispute is large or the dispute is complicated, Online ADR may have a negative effect on the resolution of the dispute. Thus, it is necessary to apply Online ADR to trifle cases or domestic cases in the early stage, accumulating experiences and correcting errors. Moreover, in order to settle numerous disputes effectively, Online ADR cases should be analyzed systematically and cases should be classified by type so that similar disputes may be settled automatically. What is more, these requirements should reflected in developing Online ADR system. Third, the application of Online ADR is being expanded to consumer disputes, domain name disputes, commercial disputes, legal disputes, etc., millions of cases are settled through Online ADR, and 115 Online ADR sites are in operation throughout the world. Thus Online ADR requires not temporary but continuous attention, and mediators and arbitrators participating in Online ADR should be more intensively educated on negotiation and information technologies. In particular, government-led research projects should be promoted to establish Online ADR model and these projects should be supported by comprehensive researches on mediation, arbitration and Online ADR. Fourth, what is most important in the continuous development and expansion of Online ADR is to secure confidence in Online ADR and advertise Online ADR to users. For this, incentives and rewards should be given to specialists such as lawyers when they participate in Online ADR as mediators and arbitrators in order to improve their expertise. What is more, from the early stage, the government and public institutions should have initiative in promoting Online ADR so that parties involved in disputes recognize the substantial contribution of Online ADR to dispute resolution. Lastly, dispute resolution through Online ADR is performed by organizations such as Korea Institute for Electronic Commerce and Korea Consumer Protection Board and partially by Korean Commercial Arbitration Board. Online ADR is expected to expand its area to commercial disputes in offline in the future. In response to this, Korean Commercial Arbitration Board, which is an organization for commercial dispute resolution, needs to be restructured.

  • PDF

Recent Variations of UV Irradiance at Seoul 2004~2010 (서울의 최근 자외선 복사의 변화 2004~2010)

  • Kim, Jhoon;Park, Sang Seo;Cho, Nayeong;Kim, Woogyung;Cho, Hi Ku
    • Atmosphere
    • /
    • v.21 no.4
    • /
    • pp.429-438
    • /
    • 2011
  • The climatology of surface UV radiation for Seoul, presented in Cho et al. (1998; 2001), has been updated using measurement of surface erythemal ultraviolet (EUV) and total ultraviolet (TUV) irradiance (wavelength 286.5~363.0 nm) by a Brewer Spectrophotometer (MK-IV) for the period 2004~2010. The analysis was also carried out together with the broadband total (global) solar irradiance (TR ; 305~2800 nm) and cloud amount to compare with the UV variations, measured by Seoul meteorological station of Korean Meteorological Agency located near the present study site. Under all-sky conditions, the day-to-day variability of EUV exhibits annual mean of 98% in increase and 31% in decrease. It has been also shown that the EUV variability is 17 times as high as the total ozone in positive change, whereas this is 6 times higher in negative change. Thus, the day to day variability is dominantly caused rather by the daily synoptic situations than by the ozone variability. Annual mean value of daily EUV and TUV shows $1.62kJm^{-2}$ and $0.63MJm^{-2}$ respectively, whereas mean value of TR is $12.4MJm^{-2}$ ($143.1Wm^{-2}$). The yearly maximum in noon-time UV Index (UVI) varies between 9 and 11 depending on time of year. The highest UVI shows 11 on 20 July, 2008 during the period 2004~2010, but for the period 1994~2000, the index of 12 was recorded on 13 July, 1994 (Cho et al., 2001). A 40% of daily maximum UVI belongs to "low (UVI < 2)", whereas the UVI less than 5% of the maximum show "very high (8 < UVI < 10)". On average, the maximum UVI exceeded 8 on 9 days per year. The values of Tropospheric Emission Monitoring Internet Service (TEMIS) EUV and UVI under cloud-free conditions are 1.8 times and 1.5 times, respectively, higher than the all-sky measurements by the Brewer. The trend analysis in fractional deviation of monthly UV from the reference value shows a decrease of -0.83% and -0.90% $decade^{-1}$ in the EUV and TUV, respectively, whereas the TR trend is near zero (+0.11% $decade^{-1}$). The trend is statistically significant except for TR trend (p = 0.279). It is possible that the recent UV decrease is mainly associated with increase in total ozone, but the trend in TR can be attributed to the other parameters such as clouds except the ozone. Certainly, the cloud effects suggest that the reason for the differences between UV and TR trends can be explained. In order to estimate cloud effects, the EUV, TUV and TR irradiances have been also evaluated for clear skies (cloud cover < 25%) and cloudy skies (cloud cover ${\geq}$ 75%). Annual mean values show that EUV, TUV and TR are $2.15kJm^{-2}$, $0.83MJm^{-2}$, and $17.9MJm^{-2}$ for clear skies, and $1.24kJm^{-2}$, $0.46MJm^{-2}$, and $7.2MJm^{-2}$ for cloudy skies, respectively. As results, the transmission of radiation through clouds under cloudy-sky conditions is observed to be 58%, 55% and 40% for EUV, TUV and TR, respectively. Consequently, it is clear that the cloud effects on EUV and TUV are 18% and 15%, respectively lower than the effects on TR under cloudy-sky conditions. Clouds under all-sky conditions (average of cloud cover is 5 tenths) reduced the EUV and TUV to about 25% of the clear-sky (cloud cover < 25%) values, whereas for TR, this was 31%. As a result, it is noted that the UV radiation is attenuated less than TR by clouds under all weather conditions.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

A Study on Understanding about the Korean movie of Internet user in China: Focused on the Reply of Movie Web-site in China and Korea (한.중 인터넷 이용자들의 한국영화 이해에 관한 비교 연구: <엽기적인 그녀> 영화 사이트의 관람후기 게시판을 중심으로)

  • Lee, Jei-Young;Choi, Jeong-Ki
    • Korean journal of communication and information
    • /
    • v.34
    • /
    • pp.196-243
    • /
    • 2006
  • The popularity of Korea pop culture, which called as the name of "Korea wave", has started to spread out in China and other Asian states from late-1990's. The study about "Korea wave" until now, however, have prevailed within an economic point of view. So, I would like to clarify that this dissertation raises a question in exiting argument and explains the identity of "Korea wave" by investigating the details of pop culture contents of Korea, and understanding of chinese receiver. It shows that chinese receiver, watching the movie , has estimated in the affirmative viewpoint after I have analyzed a reply of movie web-site in China. The main features of this analysis prove that there are a lot of good estimation when chinese receiver have seen that movie because it has been well-matched with emotion and fun of story and attraction in the movie. In that order, Some Chinese netizen evaluated that there are some negative point of view as the main actress has a strange and crazy behavior. I have also found that Korea pop culture contents has not given to them good image and chinese receiver had a tendency to view objectively to classify with strength and weakness. Analysis to contrast understanding of Chinese netizen with Korea netizen showed that Korea netizen emphasized fun of story, however, Chinese netizen showed that they had a lot of opinion to be fresh and realistic relatively. In conclusion, I would like herewith to identify that there are some differences between Chinese netizen and Korean netizen after contacting the movie. The reason has showed that understanding about the same object can be a great deal of various consideration in two more diverse cultures which have many different social-cultural and historical situation.

  • PDF

A Study of Cultural Migration of Pungmul-gut - Focusing on a Pungmul-pae's Activity in Toronto, Canada - (풍물굿의 해외 문화이주 현상에 관한 연구 - 캐나다 토론토의 풍물패 활동을 중심으로 -)

  • Lee, Yon-Shik
    • (The) Research of the performance art and culture
    • /
    • no.41
    • /
    • pp.353-380
    • /
    • 2020
  • Samul nori/Pungmul-gut is the symbol of ethnic identity for the Koreans abroad. It is the representative diaspora musical genre which is performed many cultural events held by Koreans. It is, at the same time, a global music which is appreciated by not only the Koreans but also the foreigners. Many musical communities in various countries exhibit the cultural migration through the discourse of 'tradition/variation' and 'authenticity/hybridity' in the course of the acculturation and enculturation of samul nori/pungmul-gut. The pungmul-pae 'Bichoe June' active in Toronto, Canada was organized by a foreign performer. For the foreigners pungmul-gut is easy to access as a genre of world music. As a percussion ensemble, it is easy to learn for the foreigners. The pungmul-pae 'Bichoe June' is a 'music community' consist of the Koreans and foreigners. The band tries to preserve the traditionality and authenticity of the Korean music. There is no variation or hybridity in its music since the member still learns the authentic music through various available textbooks and internet sites. Through the participation of the Koreans and foreigners, the band stimulates the globalzation of the pungmul-gut. The enculturation of the pungmul-gut is exhibited in two performances held by the band. One was host by the Canadian progressive group and the other was by the Korean conservative community. The former understood the nature of pungmul-gut as the music of the common people. The latter, however, accepted the music as the representative traditional music but was not easy to enjoy the 'noisy' music. In other words, the positive/negative acceptance of the pungmul-gut depends of the ideological nature of the listeners rather than the ethnical nature.

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

A New Approach to Automatic Keyword Generation Using Inverse Vector Space Model (키워드 자동 생성에 대한 새로운 접근법: 역 벡터공간모델을 이용한 키워드 할당 방법)

  • Cho, Won-Chin;Rho, Sang-Kyu;Yun, Ji-Young Agnes;Park, Jin-Soo
    • Asia pacific journal of information systems
    • /
    • v.21 no.1
    • /
    • pp.103-122
    • /
    • 2011
  • Recently, numerous documents have been made available electronically. Internet search engines and digital libraries commonly return query results containing hundreds or even thousands of documents. In this situation, it is virtually impossible for users to examine complete documents to determine whether they might be useful for them. For this reason, some on-line documents are accompanied by a list of keywords specified by the authors in an effort to guide the users by facilitating the filtering process. In this way, a set of keywords is often considered a condensed version of the whole document and therefore plays an important role for document retrieval, Web page retrieval, document clustering, summarization, text mining, and so on. Since many academic journals ask the authors to provide a list of five or six keywords on the first page of an article, keywords are most familiar in the context of journal articles. However, many other types of documents could not benefit from the use of keywords, including Web pages, email messages, news reports, magazine articles, and business papers. Although the potential benefit is large, the implementation itself is the obstacle; manually assigning keywords to all documents is a daunting task, or even impractical in that it is extremely tedious and time-consuming requiring a certain level of domain knowledge. Therefore, it is highly desirable to automate the keyword generation process. There are mainly two approaches to achieving this aim: keyword assignment approach and keyword extraction approach. Both approaches use machine learning methods and require, for training purposes, a set of documents with keywords already attached. In the former approach, there is a given set of vocabulary, and the aim is to match them to the texts. In other words, the keywords assignment approach seeks to select the words from a controlled vocabulary that best describes a document. Although this approach is domain dependent and is not easy to transfer and expand, it can generate implicit keywords that do not appear in a document. On the other hand, in the latter approach, the aim is to extract keywords with respect to their relevance in the text without prior vocabulary. In this approach, automatic keyword generation is treated as a classification task, and keywords are commonly extracted based on supervised learning techniques. Thus, keyword extraction algorithms classify candidate keywords in a document into positive or negative examples. Several systems such as Extractor and Kea were developed using keyword extraction approach. Most indicative words in a document are selected as keywords for that document and as a result, keywords extraction is limited to terms that appear in the document. Therefore, keywords extraction cannot generate implicit keywords that are not included in a document. According to the experiment results of Turney, about 64% to 90% of keywords assigned by the authors can be found in the full text of an article. Inversely, it also means that 10% to 36% of the keywords assigned by the authors do not appear in the article, which cannot be generated through keyword extraction algorithms. Our preliminary experiment result also shows that 37% of keywords assigned by the authors are not included in the full text. This is the reason why we have decided to adopt the keyword assignment approach. In this paper, we propose a new approach for automatic keyword assignment namely IVSM(Inverse Vector Space Model). The model is based on a vector space model. which is a conventional information retrieval model that represents documents and queries by vectors in a multidimensional space. IVSM generates an appropriate keyword set for a specific document by measuring the distance between the document and the keyword sets. The keyword assignment process of IVSM is as follows: (1) calculating the vector length of each keyword set based on each keyword weight; (2) preprocessing and parsing a target document that does not have keywords; (3) calculating the vector length of the target document based on the term frequency; (4) measuring the cosine similarity between each keyword set and the target document; and (5) generating keywords that have high similarity scores. Two keyword generation systems were implemented applying IVSM: IVSM system for Web-based community service and stand-alone IVSM system. Firstly, the IVSM system is implemented in a community service for sharing knowledge and opinions on current trends such as fashion, movies, social problems, and health information. The stand-alone IVSM system is dedicated to generating keywords for academic papers, and, indeed, it has been tested through a number of academic papers including those published by the Korean Association of Shipping and Logistics, the Korea Research Academy of Distribution Information, the Korea Logistics Society, the Korea Logistics Research Association, and the Korea Port Economic Association. We measured the performance of IVSM by the number of matches between the IVSM-generated keywords and the author-assigned keywords. According to our experiment, the precisions of IVSM applied to Web-based community service and academic journals were 0.75 and 0.71, respectively. The performance of both systems is much better than that of baseline systems that generate keywords based on simple probability. Also, IVSM shows comparable performance to Extractor that is a representative system of keyword extraction approach developed by Turney. As electronic documents increase, we expect that IVSM proposed in this paper can be applied to many electronic documents in Web-based community and digital library.