• Title/Summary/Keyword: Internet-based Research Setting

Search Result 55, Processing Time 0.03 seconds

Psychological contract-based Consumer Repurchase behavior On Social commerce platform: An Empirical study

  • Shahbaz, Hussain;Li, Ying;Li, Wenli
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2061-2083
    • /
    • 2020
  • Social commerce, integration of social media and e-commerce, provides potential opportunities for consumers to talk about their ideas and exchange product-related information on online shopping platforms. Given the substantial prospects related to business opportunities and consumers' perceptions, this study explores the factors driving fulfillment of the psychological contract in social commerce platforms. This research proposes, examines, and proves a theoretical model for the post-purchase behavior of the consumers, through an empirical investigation of online questionnaire-based data, gathered from 367 consumers in a cross-sectional setting. Results show that the fulfillment of psychological contract, consumer loyalty, and affective commitment fully mediate the impact of consumer trust on platform and repurchase intention. The level of commitment toward the consumer by the platform is strongly related to the degree of consumer trust, which is reciprocated through re-purchase intentions. This study offers essential theoretical implications with regards to the social exchange theory, attribution theory, and an moderating effect of the platform empathy on consumers' trust-psychological contract fulfillment relationship. Likewise, this research has significant implications for practitioners and managers.

Vulnerability Threat Classification Based on XLNET AND ST5-XXL model

  • Chae-Rim Hong;Jin-Keun Hong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.262-273
    • /
    • 2024
  • We provide a detailed analysis of the data processing and model training process for vulnerability classification using Transformer-based language models, especially sentence text-to-text transformers (ST5)-XXL and XLNet. The main purpose of this study is to compare the performance of the two models, identify the strengths and weaknesses of each, and determine the optimal learning rate to increase the efficiency and stability of model training. We performed data preprocessing, constructed and trained models, and evaluated performance based on data sets with various characteristics. We confirmed that the XLNet model showed excellent performance at learning rates of 1e-05 and 1e-04 and had a significantly lower loss value than the ST5-XXL model. This indicates that XLNet is more efficient for learning. Additionally, we confirmed in our study that learning rate has a significant impact on model performance. The results of the study highlight the usefulness of ST5-XXL and XLNet models in the task of classifying security vulnerabilities and highlight the importance of setting an appropriate learning rate. Future research should include more comprehensive analyzes using diverse data sets and additional models.

Performance Analysis for Accuracy of Personality Recognition Models based on Setting of Margin Values at Face Region Extraction (얼굴 영역 추출 시 여유값의 설정에 따른 개성 인식 모델 정확도 성능 분석)

  • Qiu Xu;Gyuwon Han;Bongjae Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.1
    • /
    • pp.141-147
    • /
    • 2024
  • Recently, there has been growing interest in personalized services tailored to an individual's preferences. This has led to ongoing research aimed at recognizing and leveraging an individual's personality traits. Among various methods for personality assessment, the OCEAN model stands out as a prominent approach. In utilizing OCEAN for personality recognition, a multi modal artificial intelligence model that incorporates linguistic, paralinguistic, and non-linguistic information is often employed. This paper examines the impact of the margin value set for extracting facial areas from video data on the accuracy of a personality recognition model that uses facial expressions to determine OCEAN traits. The study employed personality recognition models based on 2D Patch Partition, R2plus1D, 3D Patch Partition, and Video Swin Transformer technologies. It was observed that setting the facial area extraction margin to 60 resulted in the highest 1-MAE performance, scoring at 0.9118. These findings indicate the importance of selecting an optimal margin value to maximize the efficiency of personality recognition models.

A Study of Factors Affecting Group Polarization in Online Communication : Based on Anonymity (온라인 커뮤니케이션에서 집단극화 현상에 영향을 미치는 요인에 관한 연구: 익명성 관점에서)

  • Suh, Eung-Kyo
    • Journal of Distribution Science
    • /
    • v.13 no.2
    • /
    • pp.75-83
    • /
    • 2015
  • Purpose - This study aims to identify the effects of communication cues, anonymity, and social presence on group polarization in computer-mediated communication (CMC) settings. Extant literature has introduced some theoretical backgrounds of social presence and SIDE (Social Identity model of Deindividuation Effects) to explain the effects of communication cues and anonymity. The concept of social presence emphasized the mediating role on communication cues and anonymity. However, most literature did not measure social presence and compare group polarization of all condition groups. This does not sufficiently explain the result of group polarization. Research design, data, and methodology - We believe that the direct impact of anonymity on group polarization can provide a more admissible and clearer explanation for the results. In addition, this study categorizes anonymity into two levels, as anonymity of group and anonymity of self. To justify the anonymity view, a laboratory experiment was conducted. The experiment was conducted in communication cues settings (visual cue; without visual cue) and anonymity settings (identified; anonymous). Each of the four settings has 10 groups consisting of five subjects each (total 200 subjects). The subjects are undergraduates from a large university, majoring in business. All experimental procedures and calculations of choice shift and preference change follow the literature. Results - First, the removal of visual cues does not produce a significant impact on group polarization, which cannot be explained by the social presence view. Second, the anonymous condition does not significantly affect group polarization, which also cannot be explained by the social presence view. However, the anonymous condition directly affects group polarization. Specifically, anonymity of self has a stronger effect on group polarization than anonymity of group. The result explains about the leading factor affecting group polarization. This study examines another view of how computer-mediated communication may be associated with group polarization. The process and outcome data from the experiment reveal that group polarization is not affected by level of social presence, but by level of anonymity. Group discussions conducted with visual cue CMC setting and identified CMC setting result in weaker group polarization. Conversely, group discussions conducted without visual cue CMC setting and anonymous CMC setting lead to stronger group polarization. The results of the study have the following implications. First, they provide clues for business organizations to design the most appropriate media conditions and preemptive social conditions to implement when making group decisions through CMC, to maximize achievements, generate amicable agreements, or actively share information. Second, this study can be useful in analyzing different adverse effects generated through Internet use. Conclusions - This research can help explain discussions and decision-making actions on Internet forums, which have recently increased, as well as providing a foundational basis in newly establishing policies for the forums. Finally, it should be noted that many other factors such as group size, topics, and group history may affect group polarization. These should be examined in future studies.

Research on Digital Music Industry of Korea through SWOT Analysis (SWOT분석을 통한 한국 디지털 음악산업에 관한 연구)

  • Oh, Han-Seung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.239-244
    • /
    • 2009
  • Digital Music Industry of Korea has had its dominance over existing Record-based Music Industry since the year 2000 influencing the entire music industry. This implies the perspective for this emerging field by defining various factors based on environmental analysis. SWOT analysis, mostly used for setting up the marketing strategy is very useful analytic tool for this manner. The potentials and possibilities were saught for this emerging Digital Music Industry to have connectivity with other Media and Entertainment Industry, focusing on its strength, weakness, opportunities and threats, four variables of SWOT analysis.

  • PDF

Providing QoS in the Internet using Dynamic Node Setting Method (동적 노드 설정을 이용한 인터넷상의 QoS 제공)

  • 김중규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.5
    • /
    • pp.103-111
    • /
    • 2002
  • Historically, IP-based internets have been able to provide a simple best-effort delivery service to all applications they carry. Best effort treats all packets equally, with no service level, packet loss, and delay. The best-effort style has generally worked fine. But the needs of users have changed. The want to use the new real-time, multimedia, and multicasting applications. Thus, there is a strong need to be able to support a variety of traffic with a variety of quality-of-service requirements, within the TCP/IP architecture. This paper propose a framework that offers QoS in a DS domain using dynamic node setting method.

  • PDF

The Type setting and Application of the New-hanok type Public Buildings - Focused on Cases were completed after 2000 -

  • Park, Joon-Young;Kwon, Hyuck-Sam;Cheong, So-Yi;Bae, Kang-Won
    • KIEAE Journal
    • /
    • v.15 no.5
    • /
    • pp.47-57
    • /
    • 2015
  • Purpose: The purpose of this study is to set the type of 'the New-hanok type Public Buildings' through a case study for the hanok public buildings completed after 2000 years, and to analyze planned properties of the type. This is significant Establishing legal status of 'the New-hanok type Public Buildings' and seeing review of application possibilities of the type for providing a systematic government support measures of 'the New-hanok type public buildings' when models developing future. Method: Method of research is the first to examine the current laws and established the definition and legal status of 'the New-hanok type Public Buildings'. Followed by Setting the type classification criteria as to classify the type of 'the New-hanok type public buildings' and research architectural overview of selected cases by Literature, Internet searches, etc. After systematizing of the types classification of analysis cases, Characteristics of the type of the building structure looks catch classify in spatial structure, function, beauty. Finally, review application possibilities of the type for systematic government support measures establish when models developing of 'the New-hanok type Public Buildings' through a comprehensive analysis. Result: Selected cases were categorized as 3 types according by structural standard based on the core concept of 'the New-hanok type Public Buildings' set in this study. This can be divided into 'Wooden Structure type' and 'Composite structure - Convergence type' and 'Composite structure - juxtaposed type', 'Wooden Structure type' was re-classified by divided into '(1)Traditional Korean Wooden Structure' and '(2)Laminated Wood Wooden Structure'.

Utilizing the Customer Information for an Efficient Marketing Promotion (마케팅 촉진을 위한 고객정보의 체계화 방안)

  • 이청림;이명호;김태호
    • Korean Management Science Review
    • /
    • v.19 no.2
    • /
    • pp.205-220
    • /
    • 2002
  • As the business structure of many industries changes under IT progress and internet economy, the customer information has emerged a key factor in setting up the management policy. The customer has come to replace the product as a central figure in business competition. The domestic life insurance market has also experienced the rapid structural changes in IT time. The competition in the insurance industry to maintain the existing membership and to attract the new members gets stronger under such a new business circumstance. Accordingly, it is necessary for an individual insurance company to develop a systematic marketing plan, based on the customer information, to be competitive in the market. Unlike other studies in which customer characteristics are neglected, this study attempts to utilize the customer information by applying the data mining technique, and then suggests an efficient marketing strategy that could prevail in the competitive business environment.

Vehicle Detection in Aerial Images Based on Hyper Feature Map in Deep Convolutional Network

  • Shen, Jiaquan;Liu, Ningzhong;Sun, Han;Tao, Xiaoli;Li, Qiangyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1989-2011
    • /
    • 2019
  • Vehicle detection based on aerial images is an interesting and challenging research topic. Most of the traditional vehicle detection methods are based on the sliding window search algorithm, but these methods are not sufficient for the extraction of object features, and accompanied with heavy computational costs. Recent studies have shown that convolutional neural network algorithm has made a significant progress in computer vision, especially Faster R-CNN. However, this algorithm mainly detects objects in natural scenes, it is not suitable for detecting small object in aerial view. In this paper, an accurate and effective vehicle detection algorithm based on Faster R-CNN is proposed. Our method fuse a hyperactive feature map network with Eltwise model and Concat model, which is more conducive to the extraction of small object features. Moreover, setting suitable anchor boxes based on the size of the object is used in our model, which also effectively improves the performance of the detection. We evaluate the detection performance of our method on the Munich dataset and our collected dataset, with improvements in accuracy and effectivity compared with other methods. Our model achieves 82.2% in recall rate and 90.2% accuracy rate on Munich dataset, which has increased by 2.5 and 1.3 percentage points respectively over the state-of-the-art methods.

Secure Bootstrapping Methods of a Mobile Node on the Mobile IPv6 Network (IPv6기반 이동인터넷 환경에서 이동노드의 안전한 시동에 관한 방법)

  • Nah Jaehoon;Chung Kyoil;Han Chi-Moon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.3 s.303
    • /
    • pp.1-8
    • /
    • 2005
  • At IETF (Internet Engineering Task Force), recently RFC3775, RFC3776 documents about the mobile IPv6 were standardized by IETF (Internet Engineering Task Force). Those specifications propose that during the roaming, the mobile node sends securely the binding update to the home agent and the correspondent node after setting the security association between Mobile Node and Home Agent. But there is no secure bootstrapping method between a mobile node and a home agent at the two RFC documents. This paper proposed a method for the secure bootstrapping between a mobile node and a home agent. This makes the authentication, binding update, home agent assignment, security association distribution through the AAA-based secure channel between mobile node and home agent. And the proposed method was analyzed in the view of the procedure, round trip and security strength.