• Title/Summary/Keyword: On-line Social Network

Search Result 104, Processing Time 0.022 seconds

Study on Application of Big Data in Packaging (패키징(Packaging) 분야에서의 빅데이터(Big data) 적용방안 연구)

  • Kang, WookGeon;Ko, Euisuk;Shim, Woncheol;Lee, Hakrae;Kim, Jaineung
    • KOREAN JOURNAL OF PACKAGING SCIENCE & TECHNOLOGY
    • /
    • v.23 no.3
    • /
    • pp.201-209
    • /
    • 2017
  • The Big Data, the element of the Fourth Industrial Revolution, is drawing attention as the 4th Industrial Revolution is mentioned in the 2016 World Economic Forum. Big Data is being used in various fields because it predicts the near future and can create new business. However, utilization and research in the field of packaging are lacking. Today packaging has been demanded marketing elements that effect on consumer choice. Big data is actively used in marketing. In the marketing field, big data can be used to analyze sales information and consumer reactions to produce meaningful results. Therefore, this study proposed a method of applying big data in the field of packaging focusing on marketing. In this study suggest that try to utilize the private data and community data to analyze interaction between consumers and products. Using social big data will enable to understand the preferred packaging and consumer perceptions and emotions in the same product line. It can also be used to analyze the effects of packaging among various components of the product. Packaging is one of the many components of the product. Therefore, it is not easy to understand the impact of a single packaging element. However, this study presents the possibility of using Big Data to analyze the perceptions and feelings of consumers about packaging.

An Influence Value Algorithm based on Social Network in Knowledge Retrieval Service (지식검색 서비스에서의 소셜 네트워크 기반 영향력 지수 알고리즘)

  • Choi, Chang-Hyun;Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.43-53
    • /
    • 2009
  • Knowledge retrieval service that uses collective intelligence which has special quality of open structure and can share the accumulative data is gaining popularity. However, acquiring the right needs for users from massive public knowledge is getting harder. Recently, search results from Google which is known for it's exquisite algorism, shows results for collective intelligence such as Wikipedia, Yahoo Q/A at the highest rank. Objective of this paper is to show that most answers come from human and to find the most influential people in on-line knowledge retrieval service. Hereupon, this paper suggest the influence value calculation algorism by analyzing user relation as centrality which social network is based on user activeness and reliance in Naver 지식iN. The influence value calculated by the suggested algorism will be an important index in distinguishing reliable and the right user for the question by ranking users with troubleshooting solutions in the knowledge retrieval service. This will contribute in search satisfaction by acquiring the right information and knowledge for the users which is the most important objective for knowledge retrieval service.

An Exploratory Study on Undergraduates' SNS Addiction Tendencies and Learning Attitudes (대학생의 SNS 중독경향성과 학습태도에 관한 탐색연구)

  • Baek, Yumi
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.231-245
    • /
    • 2017
  • The purpose of this study is to analyze the trend line through scatter diagram analysis on correlation between SNS addiction tendencies and learning attitudes, figure out the knee point influencing learning attitudes negatively in detail, and examine influence among subareas. To address the goal, study questions are formulated as follows. First, this author did screening on the data of variables measured and analyzed descriptive statistics. Second, this researcher produced the trend line by drawing a scatter diagram in order to analyze correlation between SNS addiction tendencies, withdrawal symptoms, excessive communication, and excessive time wasting, and learning attitudes exploratorily. Third, to explore correlation between self-evaluation, learning participation, and developmental attitudes, the subfactors of learning attitudes related to SNS addiction tendencies, this author drew a scatter diagram and analyzed the threshold of positive and negative correlation. To verify the study questions, the SNS addiction tendency scale and learning attitude scale were applied to 301 university students in Chungcheong area. According to the study results, first, their learning attitudes are influenced by SNS addiction tendencies, excessive communication and excessive time wasting, and they are not influenced by withdrawal symptoms that much. Second, excessive communication, a factor of SNS addiction tendencies, and self-evaluation and developmental attitudes, factors of learning attitudes, show positive correlation to some extent and indicate negative correlation after the threshold. However, excessive communication and learning participation are found to show no correlation. Third, according to the results of examining correlation with learning attitudes by dividing them into excessive communication and excessive time wasting groups with the knee point of 1.40, as the symptom of excessive communication is found more, it influences self-evaluation, learning participation, developmental attitudes, and learning attitudes more negatively in general. The result of this study is expected to provide foundational material necessary to develop educational programs to prevent undergraduates' excessive SNS use and SNS addiction which can be used in the scenes of counseling or education.

Analysis of Use Behavior of Urban Park Users Expressing Depression on Social Media Using Text Mining Technique (텍스트 마이닝 기법을 활용한 SNS 상에서 우울감을 언급한 도시공원 이용자의 이용행태 분석)

  • Oh, Jiyeon;Nam, Seongwoo;Lee, Peter Sang-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.6
    • /
    • pp.319-328
    • /
    • 2022
  • The purpose of this study was to investigate the relationship between depression due to the COVID-19 pandemic and park use behaviors using on line posts. During the period of the pandemic prevention activities, text data containing both 'park' and 'depression' were collected from blogs and cafes in the search engine of Naver and Daum, then analyzed using Text Mining and Social Network techniques. As a result, the main usage behaviors of park users who mentioned depression were 'look', 'stroll(walk)' and 'eat'. Other types of behaviors were connected centering around 'look', one of the communication behaviors. Also, from CONCOR analysis, as the cluster referred from communication behavior and dynamic behavior was formed as a single behavior type, it was considered park users with depression perceived the park as the space for communication and physical activities. As the spread of COVID-19 caused the restriction of communication activities, the users might consider parks as one of the solutions. In addition, it was considered that passive usage behaviors have prevailed rather than active ones due to the depression. Resulting outcomes would be useful to plan helpful urban park for citizens. It is necessary to further analyze the park use behavior of users in relation to the period of before/after the COVID-19 pandemic and the existence/nonexistence of depression.

A Study on the Mechanism Governing the Use of Makeup-type Digital Shadow Work: A Case of Profile Picture Management (메이크업형 디지털그림자노동 사용을 지배하는 기제에 관한 연구: 프로필 사진 관리 사례)

  • Lee, Woong Kyu;Cho, Ara
    • The Journal of Information Systems
    • /
    • v.31 no.3
    • /
    • pp.1-18
    • /
    • 2022
  • Purpose The purpose of this study is to analize a psychological and behavioral mechanism for using profile picture management in digital service such as social network service. Profile picture management falls under metadata management and is performed only by those who want it. This means that it, is one of the typical makeup-type digital shadow works (DSWs) which have not been studied yet. Design/methodology/approach This study adopts ground theory method(GTM) as research methodology. GTM, which is one of qualitative methodologies, is for developing theories while most survey based methodologies, which are well adopted in much research for information systems, are for validation of theories. By interviewing ten users, the data are collected and analyzed by open coding, axis coding with paradigm model, and selective coding. Findings In result, 39 codes are found and classified into 29 sub classes and 15 classes. These 15 classes are organized by paradigm model which derives core code of profile picture management as 'voluntary management tasks to experience small pleasures with intermittent attention'. Finally, based on the paradigm model and the core code, the story line, which can explain profile picture management, is suggested.

A Study on the Hospitals' e-Business Marketing Strategy for Service Trade (서비스 무역 증진을 위한 병원 국제 e-비즈니스 마케팅 전략에 관한 연구)

  • Kim, Kee-Hong
    • International Commerce and Information Review
    • /
    • v.15 no.4
    • /
    • pp.437-454
    • /
    • 2013
  • The information exchange becomes active in the online due to the rapid development of the Internet over the various fields. It is the tendency that it acquires not only information related to the on-line related to the off line depended on the traditional oral tradition but also information in the on-line. It is the competitive environment of the hospital more competitive over the time. The felt feeling for the hospital to the consumer plays the important role as to the assessment of hospital and choice. It is very the critical matter whether it approaches the consumer to any kind of way through the on-line information transfer, and the inappropriate feeling can be caused. That is, it can install whether any kind of point about one will be embossed through the e-business marketing, and the evaluation or useful feeling for choice can be caused in the hospital to the medical consumer in being the critical matter. This research compared and analyze the results expected with the Samsung Seoul Hospital, which was most active and uses the e-business marketing among the major hospital put through in the utilization by marketing view as the domestic Big 5 Severance hospital, and feature of SNS channels of Sungmo Hospital through the case analysis. How it tried to present each channels the individual, or, the strategic frame about the unificational it utilized and can maximize the marketing result and implication according to the marketing activity purpose and direction.

  • PDF

Proximity based Circular Visualization for similarity analysis of voting patterns between nations in UN General Assembly (UN 국가의 투표 성향 유사도 분석을 위한 Proximity based Circular 시각화 연구)

  • Choi, Han Min;Mun, Seong Min;Ha, Hyo Ji;Lee, Kyung Won
    • Design Convergence Study
    • /
    • v.14 no.4
    • /
    • pp.133-150
    • /
    • 2015
  • In this study, we proposed Interactive Visualization methods that can be analyzed relations between nations in various viewpoints such as period, issue using total 5211 of the UN General Assembly voting data.For this research, we devised a similarity matrix between nations and developed two visualization method based similarity matrix. The first one is Network Graph Visualization that can be showed relations between nations which participated in the vote of the UN General Assembly like Social Network Graph by year. and the second one is Proximity based Circular Visualization that can be analyzed relations between nations focus on one nation or Changes in voting patterns between nations according to time. This study have a great signification. that's because we proposed Proximity based Circular Visualization methods which merged Line and Circle Graph for network analysis that never tried from other cases of studies that utilize conventional voting data and made it. We also derived co-operatives of each visualization through conducting a comparative experiment for the two visualization. As a research result, we found that Proximity based Circular Visualization can be better analysis each node and Network Graph Visualization can be better analysis patterns for the nations.

A Study on the Cost-Benefit Analysis for the Construction Method of Underground Railway Crossing (철도지하횡단공사 공법의 비용.편익 분석에 관한 연구)

  • Seok, Chong-Chen;Shin, Min-Ho;Eum, Ky-Yong;Kim, Mu-Il
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.407-413
    • /
    • 2006
  • Railways are very important to get stability of railway structure as transportation system carrying a lot of passengers and freight. These days the construction of underground railway crossing such as expansion of new roads, construction of subway and gas pipe is increasing because of economic and social development. But these kinds of construction didn't take into account Cost-benefit analysis of railway which has the most important aspects of railway safety, so the results of construction didn't get a good evaluation. This study adapt Cost-benefit analysis to evaluate the economic validity of underground railway crossing. This study adjust about Cost-benefit analysis of railway part, and analyze the new method and technology of underground railway crossing constructed by Korean National Railroad and Railway Network Authority. Also this study divide between high frequency line and low frequency lineusing B/C, NPV, and IRR analysis. After analysis, B/C ratio method is the most suitable method among B/C, NPV, and IRR analysis method. Therefore this study can express economic benefit quantitatively and decrease the cost by adapting Cost-benefit analysis, and can clearly express the construction feasibility and investment effects of construction of underground railway crossing method.

  • PDF

A Prioritization Method Considering Trip Patterns to Introduce Short-turn Buses (단거리 순환버스 도입을 위한 통행패턴 기반의 우선순위 결정방법)

  • Moon, Sedong;Kim, Dong-Kyu;Cho, Shin-Hyung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.5
    • /
    • pp.1-18
    • /
    • 2019
  • A short-turn bus is a bus that is operated within a subsection of an existing bus line. Previous studies regarding short-turn buses decided optimal turn-back points for a single bus line rather than a bus network. Also, in-vehicle crowding which has a significant impact on transit convenience was rarely considered. Therefore, this study aimed to develop a methodology to set priorities for the introduction of short-turn buses of bus lines and sections, considering crowding. To achieve this objective, we calculated occupancies and crowding alleviation benefits of existing bus lines overlapping a new short-turn route based on transit card data, before and after the introduction of short-turn strategy. Also, operator and social costs caused by the introduction of short-turn buses were calculated. Those procedures were iterated over bus lines and sections to operate a short-turn service, and a section whose benefit-to-cost ratio (B/C) is the largest in a line was selected to operate a short-turn service in the line. After, priorities of bus lines to introduce short-turn services could be determined based on B/C values, and the optimum total fleet size could be determined when a short-turn strategy is applied in multiple lines.

DoS/DDoS attacks Detection Algorithm and System using Packet Counting (패킷 카운팅을 이용한 DoS/DDoS 공격 탐지 알고리즘 및 이를 이용한 시스템)

  • Kim, Tae-Won;Jung, Jae-Il;Lee, Joo-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.151-159
    • /
    • 2010
  • Currently, by using the Internet, We can do varius things such as Web surfing, email, on-line shopping, stock trading on your home or office. However, as being out of the concept of security from the beginning, it is the big social issues that malicious user intrudes into the system through the network, on purpose to steal personal information or to paralyze system. In addition, network intrusion by ordinary people using network attack tools is bringing about big worries, so that the need for effective and powerful intrusion detection system becomes very important issue in our Internet environment. However, it is very difficult to prevent this attack perfectly. In this paper we proposed the algorithm for the detection of DoS attacks, and developed attack detection tools. Through learning in a normal state on Step 1, we calculate thresholds, the number of packets that are coming to each port, the median and the average utilization of each port on Step 2. And we propose values to determine how to attack detection on Step 3. By programing proposed attack detection algorithm and by testing the results, we can see that the difference between the median of packet mounts for unit interval and the average utilization of each port number is effective in detecting attacks. Also, without the need to look into the network data, we can easily be implemented by only using the number of packets to detect attacks.