• Title/Summary/Keyword: New E-Commerce System

Search Result 220, Processing Time 0.025 seconds

Prediction of Customer Satisfaction Using RFE-SHAP Feature Selection Method (RFE-SHAP을 활용한 온라인 리뷰를 통한 고객 만족도 예측)

  • Olga Chernyaeva;Taeho Hong
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.325-345
    • /
    • 2023
  • In the rapidly evolving domain of e-commerce, our study presents a cohesive approach to enhance customer satisfaction prediction from online reviews, aligning methodological innovation with practical insights. We integrate the RFE-SHAP feature selection with LDA topic modeling to streamline predictive analytics in e-commerce. This integration facilitates the identification of key features-specifically, narrowing down from an initial set of 28 to an optimal subset of 14 features for the Random Forest algorithm. Our approach strategically mitigates the common issue of overfitting in models with an excess of features, leading to an improved accuracy rate of 84% in our Random Forest model. Central to our analysis is the understanding that certain aspects in review content, such as quality, fit, and durability, play a pivotal role in influencing customer satisfaction, especially in the clothing sector. We delve into explaining how each of these selected features impacts customer satisfaction, providing a comprehensive view of the elements most appreciated by customers. Our research makes significant contributions in two key areas. First, it enhances predictive modeling within the realm of e-commerce analytics by introducing a streamlined, feature-centric approach. This refinement in methodology not only bolsters the accuracy of customer satisfaction predictions but also sets a new standard for handling feature selection in predictive models. Second, the study provides actionable insights for e-commerce platforms, especially those in the clothing sector. By highlighting which aspects of customer reviews-like quality, fit, and durability-most influence satisfaction, we offer a strategic direction for businesses to tailor their products and services.

Search Tree Generation for Efficient Management of Business Process Repository in e-commerce Delivery Exception Handling (전자상거래 배송업무의 예외처리용 프로세스 저장소의 효과적 관리를 위한 검색트리 생성)

  • Choi, Doug-Won;Shin, Jin-Gyu
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.4
    • /
    • pp.147-160
    • /
    • 2008
  • BPMS(business process management system) facilitates defining new processes or updating existing processes. However, processing of exceptional or nonroutine task requires the intervention of domain experts or introduction of the situation specific resolution process. This paper assumes sufficient amount of business process exception handling cases are stored in the process repository. Since the retrieval of the best exception handling process requires a good understanding about the exceptional situation, context awareness is an important issue. To facilitate the understanding of exceptional situation and to enable the efficient selection of the best exception handling process, we adopted the 'situation variable' and 'decision variable' construct. A case example for exception handling in the e-commerce delivery process is provided to illustrate how the proposed construct works. Application of the C5.0 algorithm guarantees the construction of an optimum search tree. It also implies that an efficient search path has been identified for the context aware selection of the best exception handling process.

  • PDF

Utilization of Mobile New Media based on Video Curation (동영상 큐레이션 기반 모바일 뉴미디어의 활용)

  • Cho, Kwangmoon
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.51-56
    • /
    • 2020
  • In this paper, we developed a mobile new media solution that enables e-commerce shopping mall operators, band operators, and YouTube creators to create synergies in online and offline promotion by posting related video contents on the media in addition to their own videos. By providing videos in the field of the platform without directly searching for them, it is possible to provide users with a new type of marketing means that can promote their platform while providing interest and information. Prospective creators at home and abroad who produce video can upload their own video in addition to YouTube and afreeca TV, such as the open market for video, and use independent and free charging systems to manage independent customer relationship management(CRM), self-branding, and content management. It will be possible to utilize mobile-based new media equipped with a system.

A Secure Credit Card Transaction Method Based on Kerberos

  • Kim, Jung-Eun;Kim, Yoo-Hwan
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.51-70
    • /
    • 2011
  • This paper introduces a new credit card payment scheme called No Number Credit Card that can significantly reduce the possibility of credit card fraud. The proposed payment system is loosely based on Kerberos, a cryptographic framework that has stood the test of time. In No Number Credit Card, instead of card numbers, only payment tokens are exchanged between the customers and merchants. The tokens are generated based on the payment amount, payment type, client information, and merchant information. However, it does not contain the credit card number, so the merchant or a database hacker cannot acquire and illegally use any credit card numbers. The No Number Credit Card system is ideal for online e-commerce transactions and can be used with any credit card that users possess. It can be used with minor modifications to the current card payment system. We provide the principles of its operation through scenario analysis, a sample implementation, and a security analysis

A Design and Security of One Card System using Smart Card (스마트카드를 이용한 원카드 시스템의 설계 및 보안)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.57-63
    • /
    • 2005
  • According to rapid development of computer and wired-wireless internet, information exchange of networking is growing. Also according as size of industry related e-commerce is bigger, it is Required the necessity of convenient user authentication system. So, the study of new authentication method to have a security and convenience is progressing systematically. Smart card of new authentication method overcome problem of established scheme. So it prospect that will be replaced One Card to have a high security and multi-function. In this papar, we suggest about the implementation of One Card System that the security of smart card and usable in all fields.

  • PDF

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques

  • El-Semary, Aly M.;Mostafa, Mostafa Gadal-Haqq M.
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.481-500
    • /
    • 2010
  • The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools is an Intrusion detection system which can be classified based on detection approachs as being signature-based or anomaly-based. Even though intrusion detection systems are well defined, their cooperation with each other to detect attacks needs to be addressed. Consequently, a new architecture that allows them to cooperate in detecting attacks is proposed. The architecture uses Software Agents to provide scalability and distributability. It works in two modes: learning and detection. During learning mode, it generates a profile for each individual system using a fuzzy data mining algorithm. During detection mode, each system uses the FuzzyJess to match network traffic against its profile. The architecture was tested against a standard data set produced by MIT's Lincoln Laboratory and the primary results show its efficiency and capability to detect attacks. Finally, two new methods, the memory-window and memoryless-window, were developed for extracting useful parameters from raw packets. The parameters are used as detection metrics.

The Development of an Internet Venture and Competitive priority revenue model (닷컴 벤처의 발전과 경쟁우위 수익모델)

  • 김종권
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2002.11a
    • /
    • pp.295-304
    • /
    • 2002
  • This case describes key development challenges and patterns as experienced by Internet Auction Company, Ltd. from the startup stage through IPO to the sale to eBay. Currently an eBay company, Internet Auction Co. continues to pursue new auction systems and substitute distribution systems for the future with a renewed entrepreneurial spirit. In 1997, Mr Hyuk Oh saw a business opportunity in the Internet allowing two-way communications. At that time, the success stories of eBay and Onsale in the United States were good stimuli to his startup of an auction site. He opened the Website in April 1, 1998 after four months of development efforts. Auction has merit more than other shopping malls. First, it brings about interesting and benefit. Second, it has interactive trade system. Third, customers will trade for reasonable price through direct own will of them. Fourth, Auction's model brings about multitude sale through aggressive sales. Even if Network Marketing has socially negative effect in case of inappropriate use, it is good mood for further business. In case E-Commerce use as useful purpose, it will have competitive priority revenue model.

  • PDF

Performance Comparison of Database Management Methods on XML Document Storage Functions for both Commerce and Military Applications (XML 문서저장에 관한 민군겸용 데이터베이스 관리체계의 성능비교)

  • Gang, Seok-Hun;Lee, Jae-Yun;Lee, Mal-Sun
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.237-260
    • /
    • 2004
  • As the research work about XML based on the development of Internet and according to the information exchange standard is being carried out, the need of discovering new methods to store XML documents and manage them efficiently according to the frequency of large-capacity XML documents increases. Consequently, as a kind of back-end database system, XML storage systems such as RDBMS, OODBMS and Native XML DBMS etc. are coming forth in order to save XML documents. It is an urgent task to make comparisons among usage expense, function comparison storage, inquiry, and manage dimension for each DBMS. This paper makes an analysis and comparison of DTD-independent XML document access methods in RDBMS, OODBMS and Native XML DBMS for XML storage and management. After analyzing the advantages and disadvantages of each access method and comparing the function of typical commerce DBMS such as Oracle 8i, eXcelon and Tamino for finding the possibility of military applications, an another appropriate method to save XML documents is proposed as to find an implementation approach to save structural XML documents.

  • PDF

A Study on the Current Operation and Activation of Online Alternative Dispute Resolution (온라인 ADR의 운영현황과 활성화 방안에 관한 연구)

  • Choi, Seok-Beom
    • Journal of Arbitration Studies
    • /
    • v.18 no.3
    • /
    • pp.91-116
    • /
    • 2008
  • E-Commerce constitutes an important part of all commercial activities. Online Alternative Dispute Resolution(Online ADR) or Online Dispute Resolution(ODR) is a new method of dispute, resolution which, is provided online. Most Online ADR services are alternatives to litigation. In this respect, they are the online transposition of the methods developed in the ADR movement such as negotiation, mediation and arbitration. But there are also online courts which are really normal courts in which the contesting parties communicate essentially online. This paper deals with the current operation of Online ADR and the ways to, activate it. They include (1) die establishment of legal stability regarding Online ADR, (2) the enhancement of system security in providing Online ADR services, (3) the introduction of Online ADR service platform for providing the various services through single window on a national, or global basis, and (4) the introduction of Online ADR online monitoring system for systematic dispute resolution services.

  • PDF

Proactive Friend Recommendation Method using Social Network in Pervasive Computing Environment (퍼베이시브 컴퓨팅 환경에서 소셜네트워크를 이용한 프로액티브 친구 추천 기법)

  • Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.43-52
    • /
    • 2013
  • Pervasive computing and social network are good resources in recommendation method. Collaborative filtering is one of the most popular recommendation methods, but it has some limitations such as rating sparsity. Moreover, it does not consider social network in pervasive computing environment. We propose an effective proactive friend recommendation method using social network and contexts in pervasive computing environment. In collaborative filtering method, users need to rate sufficient number of items. However, many users don't rate items sufficiently, because the rating information must be manually input into system. We solve the rating sparsity problem in the collaboration filtering method by using contexts. Our method considers both a static and a dynamic friendship using contexts and social network. It makes more effective recommendation. This paper describes a new friend recommendation method and then presents a music friend scenario. Our work will help e-commerce recommendation system using collaborative filtering and friend recommendation applications in social network services.