• Title/Summary/Keyword: Service Advertisement

Search Result 267, Processing Time 0.029 seconds

Users' Attitude and Behavior about Movies by the Type of SNS Usage (SNS 이용 유형에 따른 영화에 대한 태도 및 행동)

  • Choo, Hyun;Ahn, Hyung Jun
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.690-701
    • /
    • 2013
  • With the increasing adoption of social network services (SNS), the cultural and art industry is also embracing SNS as an important tool of marketing. Users can share various cultural experiences on SNS easily, and companies can analyze SNS to understand the users for effective marketing. Based on this background, this study analyzed users' behavior and attitude about movies according to SNS usage types. Users of SNS were surveyed and clustered into 'information seekers', 'fun seekers', and 'relationship seekers'. Next, the behavior of the users in each cluster was compared regarding information search about movies, preferred online advertisement channels, and post-watching behavior. The results showed that the SNS usage type has significant relationship with the behavior and attitude about movies. This suggests that movie industry can establish effective online marketing strategy by analyzing SNS usage of users.

Seamless Recording Algorithm Using MPEG System and Service Information in Mobile Broadcasting (MPEG 시스템 및 서비스 정보를 이용한 끊김 없는 모바일 방송 녹화 방법)

  • Kwon, Seong-Geun;Lee, Suk-Hwan;Kim, Kang-Wook;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.10
    • /
    • pp.1185-1195
    • /
    • 2012
  • In the general recording method of mobile broadcasting, all incoming broadcasting streams after recording time will be saved regardless of its content. In this case, as such that viewers do not want to record, commercial advertisement, are saved together. In order to solve these problems, the proposed method checks if the contents such as advertisements are exist in the target stream by analysing the splicing in incoming MPEG-2 TS streams and, if splicing happened, excludes incoming stream after the splicing in the recording process. In the proposed method, first the splice in the recording stream is verified using the related flags of adaptation field in the TS packet and, if judged to cause a splice, the time of splicing is to be estimated by evaluating the value of splice_countdown filed. In this way, the proposed algorithm provides the seamless recording method by estimating the time of splice and excluding the contents after the splicing. To evaluate the proposed seamless recording method, the simulation was carried out by modifying the software of the existing mobile broadcasting terminal.

Classification of Client-side Application-level HTTP Traffic (HTTP 트래픽의 클라이언트측 어플리케이션별 분류)

  • Choi, Mi-Jung;Jin, Chang-Gyu;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1277-1284
    • /
    • 2011
  • Today, many applications use 80 port, which is a basic port number of HTTP protocol, to avoid a blocking of firewall. HTTP protocol is used in not only Web browsing but also many applications such as the search of P2P programs, update of softwares and advertisement transfer of nateon messenger. As HTTP traffics are increasing and various applications transfer data through HTTP protocol, it is essential to identify which applications use HTTP and how they use the HTTP protocol. In order to prevent a specific application in the firewall, not the protocol-level, but the application-level traffic classification is necessary. This paper presents a method to classify HTTP traffics based on applications of the client-side and group the applications based on providing services. We developed an application-level HTTP traffic classification system and verified the method by applying the system to a small part of the campus network.

A Study on the Fee-based Strategy of Internet Service: A Case of Freechal (인터넷 서비스의 유료화 정책에 관한 연구: 프리챌 사례를 중심으로)

  • Hong, Soon-Goo;Kim, Na-Rang
    • Information Systems Review
    • /
    • v.6 no.1
    • /
    • pp.37-51
    • /
    • 2004
  • With the fee-based policy starting in 2001, the income statement of the contents providers shows that the contents sales is the number one portion, while the dotcom companies focusing on community sites have difficulties in diversifying business models. To overcome this problem, Freechal, a leader of community sites, employed a fee-based strategy for the first time in 2002, however, this attempt was failed because of a rapid decreasing number of community members. Many Internet companies too much relying on advertisement sales have been trying to turn into the fee-based business model, however, it is difficult for them to make an action plan owing to little research in this field. This paper provides an overview of community sites including their history, business models, and characteristics as well as suggests the implications from a Freechal case.

The Improved UCI Identifier Syntax for Convergence Digital Contents (융합 디지털콘텐츠에 적합한 UCI 식별자 구문구조 개선)

  • Kang, Sang-ug;Park, Sanghyun;Lim, Gyoo Gun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.9
    • /
    • pp.82-88
    • /
    • 2016
  • The proposed new UCI syntax is compatible with the existing identifier and defines fixed length in such cases as printable ID, bar code and QR code which may entail better usage of identifier itself. For the compatibility, the identifiable metadata "key" is used for the existing UCI identifier and "UCI" element of metadata is defined for the new UCI identifier. The new UCI identifier plays roles of the resolution service and representation, and the old UCI identifier plays a role of internal DB management. Also, the object code has two types, meaningless and meaningful. The meaningful object code type can be used according the content classification standards in various field as comics, games, advertisement etc. The standardization activities can be supported by the root agency of UCI.

An Assessment System for Evaluating Big Data Capability Based on a Reference Model (빅데이터 역량 평가를 위한 참조모델 및 수준진단시스템 개발)

  • Cheon, Min-Kyeong;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.2
    • /
    • pp.54-63
    • /
    • 2016
  • As technology has developed and cost for data processing has reduced, big data market has grown bigger. Developed countries such as the United States have constantly invested in big data industry and achieved some remarkable results like improving advertisement effects and getting patents for customer service. Every company aims to achieve long-term survival and profit maximization, but it needs to establish a good strategy, considering current industrial conditions so that it can accomplish its goal in big data industry. However, since domestic big data industry is at its initial stage, local companies lack systematic method to establish competitive strategy. Therefore, this research aims to help local companies diagnose their big data capabilities through a reference model and big data capability assessment system. Big data reference model consists of five maturity levels such as Ad hoc, Repeatable, Defined, Managed and Optimizing and five key dimensions such as Organization, Resources, Infrastructure, People, and Analytics. Big data assessment system is planned based on the reference model's key factors. In the Organization area, there are 4 key diagnosis factors, big data leadership, big data strategy, analytical culture and data governance. In Resource area, there are 3 factors, data management, data integrity and data security/privacy. In Infrastructure area, there are 2 factors, big data platform and data management technology. In People area, there are 3 factors, training, big data skills and business-IT alignment. In Analytics area, there are 2 factors, data analysis and data visualization. These reference model and assessment system would be a useful guideline for local companies.

Implementation of Secure E-Mail System based on lava (자바기반의 안전한 전자 메일 시스템 구현)

  • 이원구;김성준;이희규;조한진;이재광
    • Journal of Internet Computing and Services
    • /
    • v.2 no.3
    • /
    • pp.51-62
    • /
    • 2001
  • Recently, as computers and networks become popular, distributing information on the Internet is common In our daily life. also, the explosion of the Internet. of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. The e-mail has been commonly used by users as well recognizing It as the standard of manners among users on the Internet. In the past, e-mail has been the primary choice of exchanging Information, but secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. most of existing e-mail system don't have any security on the transmitted information. Thus. security mail system need to provide security including message encryption, content Integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mail system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services. API.

  • PDF

A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology (인터넷 쿠키로 인한 프라이버시 침해와 잊혀질 권리에 관한 연구)

  • Choi, Younsung;Kwon, Oh-Geol;Won, Dongho
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.77-85
    • /
    • 2016
  • Internet cookie technology is designed for solving unreliable problem of HTTP's inherent property and notifying user's previous activity to web site's server, so it is useful to provide suitable service for individual user. However, the cookie techniques are becoming more sophisticated such as the third cookie and super cookie. And its included information is applied for advertisement and target marketing strategy, so the problem occurs that user's personal information is collected excessively. However, our law does not recognize the internet cookie as personal information so user cannot know where own internet cookie is stored and applicable. Therefore, in this paper, we explain the internet cookie technology, the privacy invasion and right to be forgotten for solving problem due to the internet cookie. And we analysis the relationship between the information of internet cookie and personal information, and then present the improvement requirement on the law and technology to use internet cookie securely and conveniently.

Evaluation of Central Commissary School Foodservice Operations' Practices and their Dietitians' Job Duties (공동조리 급식학교의 운영실태 및 영양사 업무 평가)

  • Kwak, Tong-Kyung;Kim, Jeong-Lee
    • Journal of the Korean Society of Food Culture
    • /
    • v.9 no.2
    • /
    • pp.159-170
    • /
    • 1994
  • Central commissary school foodservice operations' practices and their dietitians' job duties were assessed and compared with those of their counterpart of conventional school foodservice operations to find out strategies for early settlement and better management for commissary system. Survey qestionnaires consisted of general background, employees' work schedule and dietitians' job duties. 12 commissary schools(out of 22 existing in Korea) and 77 conventional schools from Kyungkido were participated in the survey. The results of this study can be summarized as follows: 1. Central commissary school foodservice was presently utilized at 5 schools from islands type, 11 schools from rural type, and 6 schools from urban type, consisting total of 22 commissary schools, and 52 satellite schools. 2. Dietitians were evenly employed with their experiences, 55.5% were those with less than 2 years of experience, 44.6% were those with more than 2 years of experience. 3. Commissary schools employed more full-time empolyees$(1.8{\pm}0.7)$ than conventional schools$(0.3{\pm}0.5)$, however as far as the production capacity was concerned, only the part-time employees played significant roles(p<.01). Regardless of the number of students, an absolute number of full-time employees were employed, and their duties were not carried out efficiently. The part-time employees of commissary schools performed more loaded work compared to their counterparts in conventional schools. 4. Out of the dietitians' foodservice duties, 'basic food service production$(3.9{\pm}0.7)$' were carried out adequately, whereas 'nutrition education and advertisement$(2.5{\pm}0.6)$' and 'administrative affairs and information related duties$(2.8{\pm}0.9)$' were not. In order to enhance their working capacity, systematic organizational reforms are imminent. 5. Survey results also showed that dietitians performed less duties at satellite school than at the central commissary. This indicates more systematic foodservice management practices are urgently needed.

  • PDF

Correlation between Value Strategies and Financial Performance in Leading Industries (주력산업에서 가치전략과 재무성과의 상관관계)

  • Hong, Kichul;Park, Kwangho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.1
    • /
    • pp.70-83
    • /
    • 2018
  • Korea's five leading industries-chemical, automobile, shipbuilding, metal and electronics-have been the growth engines of the Korean economy for the last 30 years. However, with their performance weakening in the past few years, Korea's annual growth rate has dropped to less than 2%. Just as the Japanese economy struggled through the lost decades, Korea's leading industries have been facing signals of arriving at a Strategic Inflection Point ("SIP") since the mid-2000s. The objective of this study is to present an appropriate value strategy for Korean firms in leading industries to gain sustainable competitive advantages. This paper examines the following issues : First, it diagnoses the signs and timing of SIP for the five leading industries. Second, this study examines 78 Korean and Japanese firms in order to understand the adaptation strategies of the highest and lowest performing firms from a value strategy point of view. Third, it empirically analyzes the correlation between the indicators of value strategy and the accounting performances of the Korean and Japanese firms. The data set used in the cluster analysis were collected from KISLINE database of NICE Information Service and annual reports. The findings in the case analyses of high and low performing companies show that high value-added specialty chemical materials and electronic component manufacturers that had a strong focus on value creation were defined as high performing companies. And in the cosmetic and automobile industries, companies with a strong emphasis on value appropriation gained high performance. Furthermore, the study conducted a cluster analysis based on two indicators R&D and advertisement expense. The analysis shows that a significant gap exists in the operating incomes among three groups classified under the value strategy. The study recommends that Korean firms are requested to increase R&D expenditure, conduct M&A and collaborate with companies that own source technologies to narrow the technology gap and improve their segment portfolio from commodity to value-added products.